搜索结果: 1-13 共查到“军事学 Diffie-Hellman key”相关记录13条 . 查询时间(0.093 秒)
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project
Diffie-Hellman key agreement NIST PQC Project
2018/1/2
In November 2017, Juan edro Hecht and Jorge Alejandro Kamlofsky submitted a quaternions/octonions based Diffie-Hellman key agreement protocol HK17 to NIST post quantum cryptography project. Daniel J. ...
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
SIDH protocol Montgomery ladder post-quantum cryptography
2017/10/19
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol has positioned itself as a promising candidate for post-quantum cryptography. On...
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
Signatures Kummer Curve25519
2017/6/6
qDSA is a high-speed, high-security signature scheme that facilitates implementations with a very small memory footprint, a crucial requirement for embedded systems and IoT devices, and that uses the ...
A Framework for Universally Composable Diffie-Hellman Key Exchange
universal composability key exchange Diffie-Hellmann
2017/3/21
The analysis of real-world protocols, in particular key exchange protocols and protocols building on these protocols, is a very complex, error-prone, and tedious task. Besides the complexity of the pr...
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Post-quantum cryptography elliptic curve cryptography isogeny-based cryptography
2016/12/7
In this paper, we present a constant-time hardware implementation that achieves new speed records for the supersingular isogeny Diffie-Hellman (SIDH), even when compared to highly optimized Haswell co...
FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA
Post-quantum cryptography elliptic curve cryptography (ECC) isogeny-based cryptography
2016/7/7
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptography available in the
literature. Particularly, we present the first implementation of the supersin...
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Diffie-Hellman Problem Discrete Logarithm Problem fast generators, trapdoor.
2009/2/18
The Diffie-Hellman key agreement protocol is based
on taking large powers of a generator of a prime-order cyclic group.
Some generators allow faster exponentiation. We show that to
a large extent, ...
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
Group Diffie-Hellman Key Exchange Protocol password guessing attacks off-line and undetectable
2009/2/16
In [3], Tang presented two password guessing attacks such as off-line and undetectable
on-line dictionary attacks against password-based group Diffie-Hellman key exchange protocols
by Byun and Lee [...
Weaknesses in two group Diffie-Hellman key exchange protocols
Diffie-Hellman key exchange protocols dictionary attacks Byun and Lee suffer
2009/2/13
In this paper we show that the password-based Diffie-Hellman key exchange
protocols due to Byun and Lee suffer from dictionary attacks.
DIFFIE-HELLMAN KEY EXCHANGE PROTOCOL AND NON-ABELIAN NILPOTENT GROUPS.
Diffie-Hellman key exchange public-key cryptography p-group
2009/1/23
In this paper we study a key exchange protocol similar to Die-
Hellman key exchange protocol using abelian subgroups of the automorphism
group of a non-abelian nilpotent group. We also generalize g...
Weak keys of the Diffie Hellman key exchange II: Pairing based schemes on on elliptic curves
Diffie Hellman key Pairing based schemes elliptic curves
2009/1/14
This paper develops a cryptanalysis of the pairing based Diffie Hellman (DH) key
exchange schemes which have found important applications as in the tripartite exchange
scheme proposed in [1]. The an...
Weak keys of the Diffie-Hellman key exchange I
Discrete logarithms Diffie Hellman key exchange Finite fields
2009/1/14
This paper investigates the Diffie-Hellman key exchange scheme over the group F¤
pm of nonzero elements of finite fields and shows that there exist exponents k, l satisfying
certain conditions calle...
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
Key agreement elliptic curve cryptography Diffie-Hellman protocol key-compromise impersonation
2008/9/18
In SAC'05, Strangio proposed protocol ECKE-1 as an efficient elliptic curve
Diffie-Hellman two-party key agreement protocol using public key authentication. In
this letter, we show that despite the ...