搜索结果: 1-10 共查到“军事学 Diffie-Hellman key exchange”相关记录10条 . 查询时间(0.078 秒)
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project
Diffie-Hellman key agreement NIST PQC Project
font style='font-size:12px;'>
2018/1/2
In November 2017, Juan edro Hecht and Jorge Alejandro Kamlofsky submitted a quaternions/octonions based Diffie-Hellman key agreement protocol HK17 to NIST post quantum cryptography project. Daniel J. ...
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
SIDH protocol Montgomery ladder post-quantum cryptography
font style='font-size:12px;'>
2017/10/19
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol has positioned itself as a promising candidate for post-quantum cryptography. On...
A Framework for Universally Composable Diffie-Hellman Key Exchange
universal composability key exchange Diffie-Hellmann
font style='font-size:12px;'>
2017/3/21
The analysis of real-world protocols, in particular key exchange protocols and protocols building on these protocols, is a very complex, error-prone, and tedious task. Besides the complexity of the pr...
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Post-quantum cryptography elliptic curve cryptography isogeny-based cryptography
font style='font-size:12px;'>
2016/12/7
In this paper, we present a constant-time hardware implementation that achieves new speed records for the supersingular isogeny Diffie-Hellman (SIDH), even when compared to highly optimized Haswell co...
FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA
Post-quantum cryptography elliptic curve cryptography (ECC) isogeny-based cryptography
font style='font-size:12px;'>
2016/7/7
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptography available in the
literature. Particularly, we present the first implementation of the supersin...
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
Group Diffie-Hellman Key Exchange Protocol password guessing attacks off-line and undetectable
font style='font-size:12px;'>
2009/2/16
In [3], Tang presented two password guessing attacks such as off-line and undetectable
on-line dictionary attacks against password-based group Diffie-Hellman key exchange protocols
by Byun and Lee [...
Weaknesses in two group Diffie-Hellman key exchange protocols
Diffie-Hellman key exchange protocols dictionary attacks Byun and Lee suffer
font style='font-size:12px;'>
2009/2/13
In this paper we show that the password-based Diffie-Hellman key exchange
protocols due to Byun and Lee suffer from dictionary attacks.
DIFFIE-HELLMAN KEY EXCHANGE PROTOCOL AND NON-ABELIAN NILPOTENT GROUPS.
Diffie-Hellman key exchange public-key cryptography p-group
font style='font-size:12px;'>
2009/1/23
In this paper we study a key exchange protocol similar to Die-
Hellman key exchange protocol using abelian subgroups of the automorphism
group of a non-abelian nilpotent group. We also generalize g...
Weak keys of the Diffie Hellman key exchange II: Pairing based schemes on on elliptic curves
Diffie Hellman key Pairing based schemes elliptic curves
font style='font-size:12px;'>
2009/1/14
This paper develops a cryptanalysis of the pairing based Diffie Hellman (DH) key
exchange schemes which have found important applications as in the tripartite exchange
scheme proposed in [1]. The an...
Weak keys of the Diffie-Hellman key exchange I
Discrete logarithms Diffie Hellman key exchange Finite fields
font style='font-size:12px;'>
2009/1/14
This paper investigates the Diffie-Hellman key exchange scheme over the group F¤
pm of nonzero elements of finite fields and shows that there exist exponents k, l satisfying
certain conditions calle...