|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 19 occurrences of 16 keywords
|
|
|
Results
Found 44 publication records. Showing 44 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
109 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
95 | Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich |
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li |
A group key agreement protocol based on ECDH and short signature. |
J. Inf. Secur. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Mahdi Nikooghadam, Hamid Reza Shahriari, Saeid Tousi Saeidi |
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment. |
J. Inf. Secur. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haitham Y. Adarbah, Mostafa Farhadi Moghadam, Rolou Lyn Rodriguez Maata, Amir Hossein Mohajerzadeh, Ali H. Al-Badi |
Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
28 | K. C. Prabu Shankar, S. Prayla Shyry |
A Novel Framework for Securing ECDH Encrypted DICOM Pixel Data Stored Over Cloud Using IPFS. |
Int. J. Uncertain. Fuzziness Knowl. Based Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Eman Talib Alghareeb, Valeriy O. Osipyan |
User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol. |
Informatica (Slovenia) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | V. Padmanabha Reddy, R. Murali Prasad, Pamula Udayaraju, Bhattu HariPrasad Naik, Ch. Raja |
Efficient medical image security and transmission using modified LZW compression and ECDH-AES for telemedicine applications. |
Soft Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Zhengjun Cao |
A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment". |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
28 | Nguyen Van Nghi, Do Quang Trung, Dinh Tien Thanh |
Two Novel Variants of ECDH Key Exchange Protocol Using Schnorr Zero-Knowledge Proof. |
KSE |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Umesh K. Raut, L. K. Vishwamitra |
Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction. |
Int. J. Mob. Comput. Multim. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu |
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
28 | Prihatin Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, Asep Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad |
Analysis of ECG Image File Encryption using ECDH and AES-GCM Algorithm. |
IWBIS |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu |
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. |
ASIACRYPT (3) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tianhong Xu, Cheng Gongye, Yunsi Fei |
Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures. |
ACM Great Lakes Symposium on VLSI |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tinku Adhikari, Malay Kule, Ajoy Kumar Khan |
An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface. |
ICCCNT |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Sina Baghbanijam, Hanie Sanaei |
An Improved Authentication & Key Exchange Protocol Based on ECDH for WSNs. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
28 | Reza Azarderakhsh, Rami Elkhatib, Brian Koziel, Brandon Langenberg |
Hardware Deployment of Hybrid PQC: SIKE+ECDH. |
SecureComm (2) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Mostafa Farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amir Hossein Mohajerzadeh |
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Sameer Farooq, Priyanka Chawla |
A novel approach of asymmetric key generation in symmetric AES via ECDH. |
Int. J. Syst. Assur. Eng. Manag. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Yi Jiang, Yong Shen, Qingyi Zhu |
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes. |
Sensors |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Eugene Frimpong, Antonis Michalas |
SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG. |
SAC |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Eugene Frimpong, Antonis Michalas |
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG. |
IoTBDS |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Johann Großschädl, Zhe Liu 0001, Zhi Hu, Chunhua Su, Lu Zhou 0002 |
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. |
SIoT |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Christian Franck, Johann Großschädl, Yann Le Corre, Cyrille Lenou Tago |
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers. |
FiCloud Workshops |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Ilari Liusvaara |
CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE). |
RFC |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy |
Provably secure group key agreement protocol based on ECDH with integrated signature. |
Secur. Commun. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
28 | Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. |
CT-RSA |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Zhe Liu 0001, Hwajeong Seo, Zhi Hu, Xinyi Huang 0001, Johann Großschädl |
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. |
AsiaCCS |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jinhee Seo, Jihong Park, Young Jun Kim, DongYeop Hwang, Kangseok Kim, Ki-Hyung Kim, Ki-Beon Lee |
An ECDH-based light-weight mutual authentication scheme on local SIP. |
ICUFN |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Tibor Jager, Jörg Schwenk, Juraj Somorovsky |
Practical Invalid Curve Attacks on TLS-ECDH. |
ESORICS (1) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Qiuna Niu |
ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication. |
J. Comput. |
2014 |
DBLP BibTeX RDF |
|
28 | S. Pradheepkumar, V. Vijayalakshmi 0001, G. Zayaraz 0001 |
Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks. |
Int. J. Commun. Networks Inf. Secur. |
2010 |
DBLP BibTeX RDF |
|
28 | Ramalingam Shankar, Timothy Rajkumar, Perumal Dananjayan |
Security enhancement with optimal QoS using ECDH for converged 3G-WLAN system. |
ICARCV |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Hua-Yi Lin, Tzu-Chiang Chiang |
Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements. |
ICA3PP (1) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Hua-Yi Lin, Tzu-Chiang Chiang |
Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. |
CDVE |
2009 |
DBLP DOI BibTeX RDF |
Cooperative WSNs, DH, RSA, DLP |
23 | Neil Costigan, Peter Schwabe |
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation |
23 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
23 | Chae Hoon Lim |
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
23 | Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
23 | Olivier Billet, Marc Joye |
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. |
AAECC |
2003 |
DBLP DOI BibTeX RDF |
unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis |
Displaying result #1 - #44 of 44 (100 per page; Change: )
|
|