Sciweavers

610 search results - page 5 / 122
» Predicate-Based Key Exchange
Sort
View
KES
1999
Springer
13 years 11 months ago
An elliptic curve authenticated key exchange based approach to key infrastructure
P. Koduri, A. Mahajan, P. Montague, P. Moseley
COMSUR
2011
218views Hardware» more  COMSUR 2011»
12 years 7 months ago
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
Abstract—Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult. The challenge is to effectively exchange keys w...
Vijay K. Gurbani, Vladimir Kolesnikov
CORR
2006
Springer
129views Education» more  CORR 2006»
13 years 7 months ago
The Diffie-Hellman Key Exchange Protocol and non-abelian nilpotent groups
In this paper we study a key exchange protocol similar to the DiffieHellman key exchange protocol, using abelian subgroups of the automorphism group of a non-abelian nilpotent gro...
Ayan Mahalanobis
ASIACRYPT
2004
Springer
14 years 26 days ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 1 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer