The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase OK-ECDH (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2015 (17) 2016-2022 (19) 2023 (8)
Publication types (Num. hits)
article(18) inproceedings(26)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 19 occurrences of 16 keywords

Results
Found 44 publication records. Showing 44 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
109Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
95Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li A group key agreement protocol based on ECDH and short signature. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Mahdi Nikooghadam, Hamid Reza Shahriari, Saeid Tousi Saeidi HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Haitham Y. Adarbah, Mostafa Farhadi Moghadam, Rolou Lyn Rodriguez Maata, Amir Hossein Mohajerzadeh, Ali H. Al-Badi Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28K. C. Prabu Shankar, S. Prayla Shyry A Novel Framework for Securing ECDH Encrypted DICOM Pixel Data Stored Over Cloud Using IPFS. Search on Bibsonomy Int. J. Uncertain. Fuzziness Knowl. Based Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Eman Talib Alghareeb, Valeriy O. Osipyan User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28V. Padmanabha Reddy, R. Murali Prasad, Pamula Udayaraju, Bhattu HariPrasad Naik, Ch. Raja Efficient medical image security and transmission using modified LZW compression and ECDH-AES for telemedicine applications. Search on Bibsonomy Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Zhengjun Cao A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment". Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
28Nguyen Van Nghi, Do Quang Trung, Dinh Tien Thanh Two Novel Variants of ECDH Key Exchange Protocol Using Schnorr Zero-Knowledge Proof. Search on Bibsonomy KSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Umesh K. Raut, L. K. Vishwamitra Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction. Search on Bibsonomy Int. J. Mob. Comput. Multim. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
28Prihatin Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, Asep Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad Analysis of ECG Image File Encryption using ECDH and AES-GCM Algorithm. Search on Bibsonomy IWBIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Tianhong Xu, Cheng Gongye, Yunsi Fei Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Tinku Adhikari, Malay Kule, Ajoy Kumar Khan An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface. Search on Bibsonomy ICCCNT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Sina Baghbanijam, Hanie Sanaei An Improved Authentication & Key Exchange Protocol Based on ECDH for WSNs. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
28Reza Azarderakhsh, Rami Elkhatib, Brian Koziel, Brandon Langenberg Hardware Deployment of Hybrid PQC: SIKE+ECDH. Search on Bibsonomy SecureComm (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Mostafa Farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amir Hossein Mohajerzadeh An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Sameer Farooq, Priyanka Chawla A novel approach of asymmetric key generation in symmetric AES via ECDH. Search on Bibsonomy Int. J. Syst. Assur. Eng. Manag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Yi Jiang, Yong Shen, Qingyi Zhu A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Eugene Frimpong, Antonis Michalas SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG. Search on Bibsonomy SAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Eugene Frimpong, Antonis Michalas IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG. Search on Bibsonomy IoTBDS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Johann Großschädl, Zhe Liu 0001, Zhi Hu, Chunhua Su, Lu Zhou 0002 Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. Search on Bibsonomy SIoT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Christian Franck, Johann Großschädl, Yann Le Corre, Cyrille Lenou Tago Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers. Search on Bibsonomy FiCloud Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Ilari Liusvaara CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE). Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy Provably secure group key agreement protocol based on ECDH with integrated signature. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
28Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Zhe Liu 0001, Hwajeong Seo, Zhi Hu, Xinyi Huang 0001, Johann Großschädl Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Jinhee Seo, Jihong Park, Young Jun Kim, DongYeop Hwang, Kangseok Kim, Ki-Hyung Kim, Ki-Beon Lee An ECDH-based light-weight mutual authentication scheme on local SIP. Search on Bibsonomy ICUFN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Tibor Jager, Jörg Schwenk, Juraj Somorovsky Practical Invalid Curve Attacks on TLS-ECDH. Search on Bibsonomy ESORICS (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Qiuna Niu ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication. Search on Bibsonomy J. Comput. The full citation details ... 2014 DBLP  BibTeX  RDF
28S. Pradheepkumar, V. Vijayalakshmi 0001, G. Zayaraz 0001 Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2010 DBLP  BibTeX  RDF
28Ramalingam Shankar, Timothy Rajkumar, Perumal Dananjayan Security enhancement with optimal QoS using ECDH for converged 3G-WLAN system. Search on Bibsonomy ICARCV The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Hua-Yi Lin, Tzu-Chiang Chiang Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements. Search on Bibsonomy ICA3PP (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Hua-Yi Lin, Tzu-Chiang Chiang Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. Search on Bibsonomy CDVE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cooperative WSNs, DH, RSA, DLP
23Neil Costigan, Peter Schwabe Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation
23Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF matrix semigroup action, DDH problem, public key cryptosystem, semantically secure
23Chae Hoon Lim LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Adam L. Young, Moti Yung A Timing-Resistant Elliptic Curve Backdoor in RSA. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Twisted elliptic curves, RSA, subliminal channel, kleptography
23Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM
23Olivier Billet, Marc Joye The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis
Displaying result #1 - #44 of 44 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license