|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 19 occurrences of 16 keywords
|
|
|
Results
Found 44 publication records. Showing 44 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
109 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.  |
CHES  |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
95 | Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich |
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.  |
WISTP  |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li |
A group key agreement protocol based on ECDH and short signature.  |
J. Inf. Secur. Appl.  |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Mahdi Nikooghadam, Hamid Reza Shahriari, Saeid Tousi Saeidi |
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment.  |
J. Inf. Secur. Appl.  |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haitham Y. Adarbah, Mostafa Farhadi Moghadam, Rolou Lyn Rodriguez Maata, Amir Hossein Mohajerzadeh, Ali H. Al-Badi |
Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security.  |
IEEE Access  |
2023 |
DBLP DOI BibTeX RDF |
|
28 | K. C. Prabu Shankar, S. Prayla Shyry |
A Novel Framework for Securing ECDH Encrypted DICOM Pixel Data Stored Over Cloud Using IPFS.  |
Int. J. Uncertain. Fuzziness Knowl. Based Syst.  |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Eman Talib Alghareeb, Valeriy O. Osipyan |
User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol.  |
Informatica (Slovenia)  |
2023 |
DBLP DOI BibTeX RDF |
|
28 | V. Padmanabha Reddy, R. Murali Prasad, Pamula Udayaraju, Bhattu HariPrasad Naik, Ch. Raja |
Efficient medical image security and transmission using modified LZW compression and ECDH-AES for telemedicine applications.  |
Soft Comput.  |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Zhengjun Cao |
A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment".  |
IACR Cryptol. ePrint Arch.  |
2023 |
DBLP BibTeX RDF |
|
28 | Nguyen Van Nghi, Do Quang Trung, Dinh Tien Thanh |
Two Novel Variants of ECDH Key Exchange Protocol Using Schnorr Zero-Knowledge Proof.  |
KSE  |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Umesh K. Raut, L. K. Vishwamitra |
Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction.  |
Int. J. Mob. Comput. Multim. Commun.  |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu |
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.  |
IACR Cryptol. ePrint Arch.  |
2022 |
DBLP BibTeX RDF |
|
28 | Prihatin Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, Asep Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad |
Analysis of ECG Image File Encryption using ECDH and AES-GCM Algorithm.  |
IWBIS  |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu |
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.  |
ASIACRYPT (3)  |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tianhong Xu, Cheng Gongye, Yunsi Fei |
Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures.  |
ACM Great Lakes Symposium on VLSI  |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tinku Adhikari, Malay Kule, Ajoy Kumar Khan |
An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface.  |
ICCCNT  |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Sina Baghbanijam, Hanie Sanaei |
An Improved Authentication & Key Exchange Protocol Based on ECDH for WSNs.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
28 | Reza Azarderakhsh, Rami Elkhatib, Brian Koziel, Brandon Langenberg |
Hardware Deployment of Hybrid PQC: SIKE+ECDH.  |
SecureComm (2)  |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Mostafa Farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amir Hossein Mohajerzadeh |
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network.  |
IEEE Access  |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Sameer Farooq, Priyanka Chawla |
A novel approach of asymmetric key generation in symmetric AES via ECDH.  |
Int. J. Syst. Assur. Eng. Manag.  |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Yi Jiang, Yong Shen, Qingyi Zhu |
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes.  |
Sensors  |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Eugene Frimpong, Antonis Michalas |
SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG.  |
SAC ![In: SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020, pp. 767-769, 2020, ACM, 978-1-4503-6866-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Eugene Frimpong, Antonis Michalas |
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG.  |
IoTBDS  |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Johann Großschädl, Zhe Liu 0001, Zhi Hu, Chunhua Su, Lu Zhou 0002 |
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.  |
SIoT  |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Christian Franck, Johann Großschädl, Yann Le Corre, Cyrille Lenou Tago |
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers.  |
FiCloud Workshops  |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Ilari Liusvaara |
CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE).  |
RFC  |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy |
Provably secure group key agreement protocol based on ECDH with integrated signature.  |
Secur. Commun. Networks  |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.  |
IACR Cryptol. ePrint Arch.  |
2016 |
DBLP BibTeX RDF |
|
28 | Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.  |
CT-RSA  |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Zhe Liu 0001, Hwajeong Seo, Zhi Hu, Xinyi Huang 0001, Johann Großschädl |
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.  |
AsiaCCS  |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jinhee Seo, Jihong Park, Young Jun Kim, DongYeop Hwang, Kangseok Kim, Ki-Hyung Kim, Ki-Beon Lee |
An ECDH-based light-weight mutual authentication scheme on local SIP.  |
ICUFN  |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Tibor Jager, Jörg Schwenk, Juraj Somorovsky |
Practical Invalid Curve Attacks on TLS-ECDH.  |
ESORICS (1)  |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Qiuna Niu |
ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication.  |
J. Comput.  |
2014 |
DBLP BibTeX RDF |
|
28 | S. Pradheepkumar, V. Vijayalakshmi 0001, G. Zayaraz 0001 |
Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks.  |
Int. J. Commun. Networks Inf. Secur.  |
2010 |
DBLP BibTeX RDF |
|
28 | Ramalingam Shankar, Timothy Rajkumar, Perumal Dananjayan |
Security enhancement with optimal QoS using ECDH for converged 3G-WLAN system.  |
ICARCV  |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Hua-Yi Lin, Tzu-Chiang Chiang |
Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements.  |
ICA3PP (1)  |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Hua-Yi Lin, Tzu-Chiang Chiang |
Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems.  |
CDVE  |
2009 |
DBLP DOI BibTeX RDF |
Cooperative WSNs, DH, RSA, DLP |
23 | Neil Costigan, Peter Schwabe |
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine.  |
AFRICACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation |
23 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem.  |
ProvSec  |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
23 | Chae Hoon Lim |
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks.  |
ICDCS Workshops  |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA.  |
Inscrypt  |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
23 | Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.  |
EUC Workshops  |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management.  |
AINA (1)  |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
23 | Olivier Billet, Marc Joye |
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis.  |
AAECC  |
2003 |
DBLP DOI BibTeX RDF |
unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis |
Displaying result #1 - #44 of 44 (100 per page; Change: )
|
|