Showing 41 - 50 results of 50 for search '"Diffie–Hellman key exchange"', query time: 0.09s Refine Results
  1. 41

    Cryptanalysis of El-Gamal AAs cryptosystem by Mandangan, Arif

    Published 2011
    “…The key exchange protocol of the AAs cryptosystem is analogous to the Diffie-Hellman key exchange protocol. The encryption and decryption processes of the AAs -cryptosystem are efficient since the operations involved are the simple addition and subtraction modulo 1. …”
    Get full text
    Thesis
  2. 42
  3. 43

    A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting by Tsung-Hung Lin, Chen-Kun Tsung, Tian-Fu Lee, Zeng-Bo Wang

    Published 2017-12-01
    “…Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. …”
    Get full text
    Article
  4. 44

    Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application by Esam A. A. Hagras, Saad Aldosary, Haitham Khaled, Tarek M. Hassan

    Published 2023-07-01
    “…The public key elliptic curve discrete logarithmic problem (EC-DLP) is used for elliptic curve Diffie–Hellman key exchange (EC-DHKE) in order to generate a shared session key, which is used as the chaotic system’s beginning conditions and control parameters. …”
    Get full text
    Article
  5. 45

    Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography by Jahani, Shahram

    Published 2016
    “…For RSA encryption and decryption, ElGamal digital signature and Diffie-Hellman key exchange are some of the well-known example of these cryptosystems which benefit from these operations. …”
    Get full text
    Thesis
  6. 46

    Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs by Mishri Saleh Al-Marshoud, Ali H. Al-Bayatti, Mehmet Sabir Kiraz

    Published 2021-05-01
    “…Third, the mutual authentication prevents any leakage from the mix zones’ symmetric keys by generating a fresh one for each communication through a Diffie–Hellman key exchange.…”
    Get full text
    Article
  7. 47

    Shor's Factoring Algorithm and Modular Exponentiation Operators by Robert L. Singleton Jr

    Published 2023-09-01
    “…Shor's algorithm therefore has profound implication for public-key encryption such as RSA and Diffie–Hellman key exchange. We assume no prior knowledge of Shor's algorithm beyond a basic familiarity with the circuit model of quantum computing. …”
    Get full text
    Article
  8. 48

    Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note Mechanism by Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao, Hua Tang

    Published 2024-02-01
    “…Firstly, the proposed method generates a random seed known only to the parties involved based on the Diffie–Hellman key exchange protocol, ensuring the privacy of transactions. …”
    Get full text
    Article
  9. 49

    Lightweight identity based online/offline signature scheme for wireless sensor networks by Alquraishee, Anser Ghazzaal Ali

    Published 2022
    “…Multiple traditional reliable encryption methods like RSA encryption-decryption and Diffie–Hellman key exchange face a crisis of computational resources due to limited storage, low computational ability, and insufficient power in lightweight WSNs. …”
    Get full text
    Thesis
  10. 50

    Secure cross-layer routing protocol with authentication key management scheme for manets by G.R. Rama Devi, M. Swamy Das, M.V. Ramana Murthy

    Published 2023-10-01
    “…ECC (Elliptical curve cryptography) and Diffie-Hellman key exchanges with bilinear maps improve security of communications. …”
    Get full text
    Article