Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Yi-Li Huang, Fang-Yie Leu |
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(3), pp. 96-107, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Jiaxin Pan, Libin Wang |
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 1(2/3), pp. 107-124, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Andrew C. Yao, Yunlei Zhao |
A New Family of Practical Non-Malleable Diffie-Hellman Protocols ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1105.1071, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
33 | Chia-Hui Wang, Yu-Shun Liu |
A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 34(5), pp. 1545-1556, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Jonathan C. Herzog, Roger Khazan |
Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6278, pp. 1-16, June 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Yu Chen 0003, Liqun Chen 0002, Zongyang Zhang |
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 593, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
33 | Liqun Chen 0002, Yu Chen 0003 |
The n-Diffie-Hellman Problem and its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 397, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
33 | Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang, Kangbin Yim |
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 7(3), pp. 241-269, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
Computational Soundness - The Case of Diffie-Hellman Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 277-302, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Fangguo Zhang, Ping Wang 0005 |
On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings, pp. 283-293, 2011, Springer, 978-3-642-20900-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang |
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings, pp. 255-270, 2011, Springer, 978-3-642-23299-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Michal Koza |
Restricted Identification Scheme and Diffie-Hellman Linking Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 221-238, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Liqun Chen 0002, Yu Chen 0003 |
The n-Diffie-Hellman Problem and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 119-134, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Jayaprakash Kar, Banshidhar Majhi |
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011, pp. 493-498, 2011, ACM, 978-1-4503-0464-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Yu Chen 0003, Liqun Chen 0002, Zongyang Zhang |
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers, pp. 275-301, 2011, Springer, 978-3-642-31911-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Jiaxin Pan, Libin Wang |
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 380-388, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Hagen Stübing, Murat Ceven, Sorin A. Huss |
A Diffie-Hellman based privacy protocol for Car-to-X communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 201-204, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Sebastian Mödersheim |
Diffie-Hellman without Difficulty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers, pp. 214-229, 2011, Springer, 978-3-642-29419-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Alfred Menezes, Berkant Ustaoglu |
On reusing ephemeral keys in Diffie-Hellman key agreement protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 2(2), pp. 154-158, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Dongyoung Roh, Sang Geun Hahn |
On the bit security of the weak Diffie-Hellman problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 110(18-19), pp. 799-802, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Jie Liu, Jianhua Li |
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 11(2), pp. 114-117, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Liping Zhang, Fengyu Lei, Jin Chen |
The Larger Integer Library and the Diffie-Hellman Protocol based on XTR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Content Technol. its Appl. ![In: J. Digit. Content Technol. its Appl. 4(7), pp. 108-114, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Alec Brusilovsky, Igor Faynberg, Zachary Zeltsan, Sarvar Patel |
Password-Authenticated Key (PAK) Diffie-Hellman Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5683, pp. 1-10, February 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Robert Granger |
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 177, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Jayaprakash Kar, Banshidhar Majhi |
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 340, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Neal Koblitz, Alfred Menezes, Igor E. Shparlinski |
Discrete Logarithms, Diffie-Hellman, and Reductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 577, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 68, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Naoki Tanaka, Taiichi Saito |
On the q-Strong Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 215, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Ran Canetti, Sebastian Gajek |
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 303, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Antoine Joux, Vanessa Vitse |
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on E(Fq5). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 157, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup |
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 33, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | Yuh-Min Tseng, Tsu-Yang Wu |
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica ![In: Informatica 21(2), pp. 247-258, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | HyunGon Kim, Jong-Hyouk Lee |
Diffie-Hellman key based authentication in proxy mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 6(1), pp. 107-121, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater |
Signcryption Schemes Based on the Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Practical Signcryption ![In: Practical Signcryption, pp. 57-69, 2010, Springer, 978-3-540-89409-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Eltayeb Abuelyaman, Atikan Teber, Khaled Al Mustafa |
Extension of Diffie-Hellman's Secure Key Distribution Technique to Multipoint Broadcasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 714-720, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
33 | David Galindo |
Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings, pp. 367-376, 2010, Springer, 978-3-642-17454-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings, pp. 309-328, 2010, 978-3-642-13707-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Robert Granger |
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, pp. 283-302, 2010, Springer, 978-3-642-17372-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup |
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, pp. 1-18, 2010, Springer, 978-3-642-13012-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Yu Chen 0003, Liqun Chen 0002 |
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers, pp. 113-132, 2010, Springer, 978-3-642-24208-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Yuh-Min Tseng, Tsu-Yang Wu |
A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part IV, pp. 225-235, 2010, Springer, 978-3-642-12188-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Shota Yamada 0001, Goichiro Hanaoka, Noboru Kunihiro |
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings, pp. 229-243, 2010, Springer, 978-3-642-16279-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Dario Fiore 0001, Rosario Gennaro |
Making the Diffie-Hellman Protocol Identity-Based. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, pp. 165-178, 2010, Springer, 978-3-642-11924-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | David Cash, Eike Kiltz, Victor Shoup |
The Twin Diffie-Hellman Problem and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(4), pp. 470-504, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | DaeHun Nyang, Akihiro Yamamura |
More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(7), pp. 1720-1723, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Sunghyuck Hong |
Secure and Efficient Tree-based Group Diffie-Hellman Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 3(2), pp. 178-194, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Dustin Moody |
The Diffie-Hellman problem and generalization of Verheul's theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(3), pp. 381-390, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Shengbao Wang |
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0909.1388, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
33 | Dario Fiore 0001, Rosario Gennaro |
Making the Diffie-Hellman Protocol Identity-Based. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 174, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
33 | Shengbao Wang |
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 437, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
33 | Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard |
A Secure and Efficient Authenticated Diffie - Hellman Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 408, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
33 | Berkant Ustaoglu |
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 353, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
33 | David Jao, Kayo Yoshida |
Boneh-Boyen signatures and the Strong Diffie-Hellman problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 221, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
33 | Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard |
A Secure and Efficient Authenticated Diffie-Hellman Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers, pp. 83-98, 2009, Springer, 978-3-642-16440-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ralf Küsters, Tomasz Truderung |
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pp. 157-171, 2009, IEEE Computer Society, 978-0-7695-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Mingqiang Wang, Leibo Li |
A Note on Twin Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (1) ![In: 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers, pp. 451-454, 2009, IEEE Computer Society, 978-0-7695-3931-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Gautam Biswas |
Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 2(1), pp. 12-18, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Rongxing Lu, Xiaodong Lin 0001, Zhenfu Cao, Liuquan Qin, Xiaohui Liang |
A simple deniable authentication protocol based on the Diffie-Hellman algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Math. ![In: Int. J. Comput. Math. 85(9), pp. 1315-1323, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ian F. Blake, Theodoulos Garefalakis |
Polynomial approximation of bilinear Diffie-Hellman maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Finite Fields Their Appl. ![In: Finite Fields Their Appl. 14(2), pp. 379-389, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh |
Weak Composite Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 7(3), pp. 383-387, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Jelena V. Misic |
Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 52(11), pp. 2227-2236, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Jaeduck Choi, Souhwan Jung |
A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 91-B(2), pp. 605-608, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Mei-Chu Chang, Chui Zhi Yao |
An Explicit Bound On Double Exponential Sums Related to Diffie--Hellman Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Discret. Math. ![In: SIAM J. Discret. Math. 22(1), pp. 348-359, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Matt Lepinski, Stephen T. Kent |
Additional Diffie-Hellman Groups for Use with IETF Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5114, pp. 1-23, January 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Jung-San Lee, Chin-Chen Chang 0001 |
Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 1(4), pp. 277-286, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Jooyoung Lee, Je Hong Park |
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 344, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Raghav Bhaskar, K. Chandrasekaran 0003, Satyanarayana V. Lokam, Peter L. Montgomery, Ramarathnam Venkatesan, Yacov Yacobi |
On The Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 525, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | David Cash, Eike Kiltz, Victor Shoup |
The Twin Diffie-Hellman Problem and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 67, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Goichiro Hanaoka, Kaoru Kurosawa |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 211, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Hai Huang 0005, Zhenfu Cao |
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 224, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Dustin Moody |
The Diffie-Hellman problem and generalization of Verheul's theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 456, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé |
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 217, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Hai Huang, Zhenfu Cao |
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 500, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
33 | Neal Koblitz, Alfred Menezes |
Another look at non-standard discrete log and Diffie-Hellman problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 2(4), pp. 311-326, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang 0001 |
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 12(2), pp. 149-151, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Mohamed Abid, Hossam Afifi |
Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 99-102, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ming Chen 0009, Kaigui Wu, Qi Xie, Zhongfu Wu |
The Diffie-Hellman Authentication Test in the Strand-Space Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ChinaGrid ![In: The Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, Chian, 20-22 August, 2008, pp. 174-181, 2008, IEEE Computer Society, 978-0-7695-3306-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Dennis K. Nilsson, Ulf E. Larson, Erland Jonsson |
Auxiliary channel Diffie-Hellman encrypted key-exchange authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSHINE ![In: 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2008, Hong Kong, July 28-31, 2008, pp. 18, 2008, ICST, 978-963-9799-26-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ali Bagherzandi, Stanislaw Jarecki |
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 218-235, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Jun Yang, Xianze Yang |
A New Variant of the Diffie-Hellman Key-Exchange Protocol Based on Block Triangular Matrix Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1277-1281, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky |
Circular-Secure Encryption from Decision Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 108-125, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 2(3/4), pp. 284-296, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 36, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
33 | Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang 0001 |
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 26, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
33 | Changshe Ma, Jian Weng 0001, Dong Zheng 0001 |
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 19, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
33 | Neal Koblitz, Alfred Menezes |
Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 442, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
33 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
Strong Diffie-Hellman-DSA Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 11(5), pp. 432-433, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Beata Rafalska |
The Diffie-Hellman Problem in Lie Algebras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSEISP ![In: Rough Sets and Intelligent Systems Paradigms, International Conference, RSEISP 2007, Warsaw, Poland, June 28-30, 2007, Proceedings, pp. 622-629, 2007, Springer, 978-3-540-73450-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
differentiable maps, cryptography, attacks, proxy signatures, Lie algebras |
33 | Boaz Tsaban |
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 99(4), pp. 145-148, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Chik How Tan |
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1), pp. 206-208, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ayan Mahalanobis |
The Diffie-Hellman Key Exchange Protocol and non-abelian nilpotent groups ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/math/0602282, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
33 | Abhishek Parakh |
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0604100, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
33 | Eike Kiltz, Arne Winterhof |
Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Appl. Math. ![In: Discret. Appl. Math. 154(2), pp. 326-336, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Martin Euchner |
HMAC-Authenticated Diffie-Hellman for Multimedia Internet KEYing (MIKEY). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4650, pp. 1-27, September 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Markus Friedl, Niels Provos, William Allen Simpson |
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4419, pp. 1-10, March 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | |
Frobenius expansion and the Diffie Hellman problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 174, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
33 | Yong Wang, Byrav Ramamurthy, Xukai Zou |
The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2006, Istanbul, Turkey, 11-15 June 2006, pp. 2243-2248, 2006, IEEE, 1-4244-0355-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 226-238, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy |
33 | Ran Canetti |
Decisional Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Igor E. Shparlinski |
Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|