• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 211
Next 10 →

ON REUSING EPHEMERAL KEYS IN DIFFIE-HELLMAN KEY AGREEMENT PROTOCOLS

by Alfred Menezes, Berkant Ustaoglu
"... Abstract. A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note we highlight the danger of reusing ephemeral keys if domain parameters are not appropria ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Abstract. A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note we highlight the danger of reusing ephemeral keys if domain parameters

Authenticated Diffie-Hellman Key Agreement Protocols

by Simon Blake-Wilson, Alfred Menezes , 1998
"... This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, a ..."
Abstract - Cited by 83 (1 self) - Add to MetaCart
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO

Security Issues in the Diffie-Hellman Key Agreement Protocol

by Jean-françois Raymond, Anton Stiglic - IEEE Trans. on Information Theory , 2000
"... Diffie-Hellman key agreement protocol [27] implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, haven't been taken into account by protocol designers. In this paper we attempt to provide a link between theoretical research and r ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
Diffie-Hellman key agreement protocol [27] implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, haven't been taken into account by protocol designers. In this paper we attempt to provide a link between theoretical research

On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings

by Shengbao Wang , 2009
"... This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings. For the Sakai-Ohgishi-Kasahara (SOK) ID-based key construction, we show that identical to the Diffie-Hellman protocol, the SOK ke ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
key agreement protocol also has three variants, namely ephemeral, semi-static and static versions. Upon this, we build solid relations between authenticated Diffie-Hellman (Auth-DH) protocols and ID-based authenticated key agreement (IB-AK) protocols, whereby we present two substitution rules

Analysis on the Diffie-Hellman Mode

by Riccardo Bresciani, Riccardo Bresciani , 2009
"... Abstract ZRTP is a key agreement protocol by Philip Zimmermann, Alan Johnston and Jon Callas, which relies on a Diffie-Hellman exchange to generate SRTP session parameters, providing confidentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure or endpoint ..."
Abstract - Add to MetaCart
Abstract ZRTP is a key agreement protocol by Philip Zimmermann, Alan Johnston and Jon Callas, which relies on a Diffie-Hellman exchange to generate SRTP session parameters, providing confidentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure

A Quantum Diffie-Hellman Protocol

by Pranav Subramaniam, Abhishek Parakh
"... Abstract—In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. I. ..."
Abstract - Add to MetaCart
Abstract—In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. I.

Decidability for Lightweight Diffie-Hellman Protocols

by Daniel J. Dougherty, Joshua D. Guttman
"... Abstract—Many protocols use Diffie-Hellman key agreement, combined with certified long-term values or digital signatures for authentication. These protocols aim at security goals such as key secrecy, forward secrecy, resistance to key compromise attacks, and various flavors of authentication. Howeve ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract—Many protocols use Diffie-Hellman key agreement, combined with certified long-term values or digital signatures for authentication. These protocols aim at security goals such as key secrecy, forward secrecy, resistance to key compromise attacks, and various flavors of authentication

Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol ⋆

by Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang , 2007
"... Abstract. In SAC’05, Strangio proposed protocol ECKE-1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. In this letter, we show that despite the author’s claims protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We al ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract. In SAC’05, Strangio proposed protocol ECKE-1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. In this letter, we show that despite the author’s claims protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We

Exponentiation Speed Up For Diffie-Hellman Key Agreement Protocol

by Shay Gueron, Or Zuk , 2006
"... Abstract — The Diffie-Hellman key agreement protocol is a well known method in which two parties agree on a secret key by mean of public communication. From the computational point of view, the protocol requires, from both paries, to execute two exponentiations in some group, where the secret expone ..."
Abstract - Add to MetaCart
Abstract — The Diffie-Hellman key agreement protocol is a well known method in which two parties agree on a secret key by mean of public communication. From the computational point of view, the protocol requires, from both paries, to execute two exponentiations in some group, where the secret

The diffie-hellman key-agreement scheme in the strand-space model

by Jonathan C. Herzog - In Proceedings, 16th IEEE Computer Security Foundations Workshop. IEEE CS , 2003
"... The Diffie-Hellman key exchange scheme is a standard component of cryptographic protocols. In this paper, we propose a way in which protocols that use this computational primitive can be verified using formal methods. In particular, we separate the computational aspects of such an analysis from the ..."
Abstract - Cited by 11 (2 self) - Add to MetaCart
The Diffie-Hellman key exchange scheme is a standard component of cryptographic protocols. In this paper, we propose a way in which protocols that use this computational primitive can be verified using formal methods. In particular, we separate the computational aspects of such an analysis from
Next 10 →
Results 1 - 10 of 211
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University