Showing 1 - 20 results of 50 for search '"Diffie–Hellman key exchange"', query time: 0.36s Refine Results
  1. 1

    Algebraic generalization of Diffie–Hellman key exchange by Partala Juha

    Published 2018-03-01
    “…The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primitives. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH by Daniel Cervantes‐Vázquez, Eduardo Ochoa‐Jiménez, Francisco Rodríguez‐Henríquez

    Published 2021-09-01
    “…Abstract The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. …”
    Get full text
    Article
  6. 6

    New Diffie Hellman key exchange primitive based upon binary field by Kanniah, Uma S., Samsudin, Azman

    Published 2013
    “…One of the earliest public-key algorithm is Diffie Hellman key exchange algorithm.The Diffie Hellman key exchange allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.However, one drawback of this algorithm is the inherently expensive exponential calculation that provides the needed one-way trapdoor mechanism.Hence, an alternative approach is proposed whereby the key exchange will no longer depend on the prime field instead the newly proposed algorithm will now depend on the binary field as it is known that binary field operations are inexpensive and provides notably faster computations.The result evidently shows that the binary field Diffie Hellman performs almost twice as fast as the prime field Diffie Hellman.In general, this result serves as an example in which the binary field can benefit the mainstream cryptography. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange for LTE Military Grade Communication by Karim H. Moussa, Ahmed H. El-Sakka, Shawky Shaaban, Hassan Nadir Kheirallah

    Published 2022-01-01
    “…GSAKA-ECDHKE protocol is based on Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) and hash function to generate and share secret Elliptic Curve (EC) key to encrypt and protect the routing authentication parameters. …”
    Get full text
    Article
  12. 12

    Enhancing secrecy using hybrid elliptic curve cryptography and Diffie Hellman key exchange approach and Young's double slit experiment optimizer based optimized cross layer in multihop wireless network by Bhagappa, H.S. Divyashree, N. Avinash, B.N. Manjunatha, J. Vishesh, M. Mamatha

    Published 2024-02-01
    “…The secrecy of the network can be enhanced with the proposed innovative approach known as Hybrid Elliptic Curve Cryptography and Diffie Hellman Key Exchange (HECC-DH). This greatly enhances data integrity and security by offering dual authentications with key exchange techniques. …”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Design of Secure Chatting Application with End to End Encryption for Android Platform by Ammar Ali, Ali Sagheer

    Published 2017-06-01
    Subjects: “…android, chatting application, ecdh (elliptic curve diffie hellman key exchange), aes (advanced encryption standard), rc4 (rivest cipher 4)…”
    Get full text
    Article
  19. 19
  20. 20

    Chaotic asymmetric encryption process for data security. by Kamel Arrifin, Muhammad Rezal, Mohd Atan, Kamel Ariffin

    Published 2008
    “…Disclosed is a method and apparatus for a chaotic asymmetric encryption system that is based on a mathematically proven chaotic dynamical system, the ergodic property of chaotic maps, conventional Diffie-Hellman key exchange procedure, a modified Diffie-Hellman key exchange procedure and a public key which is any number that could be chosen from the interval 0,1. …”
    Patent