-
1
Algebraic generalization of Diffie–Hellman key exchange
Published 2018-03-01“…The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primitives. …”
Get full text
Article -
2
-
3
Modification of Diffie–Hellman Key Exchange Algorithm for Zero Knowledge Proof
Published 2012-01-01Get full text
Article -
4
-
5
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01“…Abstract The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. …”
Get full text
Article -
6
New Diffie Hellman key exchange primitive based upon binary field
Published 2013“…One of the earliest public-key algorithm is Diffie Hellman key exchange algorithm.The Diffie Hellman key exchange allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.However, one drawback of this algorithm is the inherently expensive exponential calculation that provides the needed one-way trapdoor mechanism.Hence, an alternative approach is proposed whereby the key exchange will no longer depend on the prime field instead the newly proposed algorithm will now depend on the binary field as it is known that binary field operations are inexpensive and provides notably faster computations.The result evidently shows that the binary field Diffie Hellman performs almost twice as fast as the prime field Diffie Hellman.In general, this result serves as an example in which the binary field can benefit the mainstream cryptography. …”
Get full text
Article -
7
-
8
-
9
An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and Hill Cipher
Published 2024-03-01Subjects: “…elliptic curve diffie-hellman key exchange protocol…”
Get full text
Article -
10
A Secure Medical Image Transmission System Based On 2D Logistic Map and Diffie-Hellman Key Exchange Mechanisms
Published 2022-10-01Subjects: “…chaotic map, diffie–hellman key exchange…”
Get full text
Article -
11
Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange for LTE Military Grade Communication
Published 2022-01-01“…GSAKA-ECDHKE protocol is based on Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) and hash function to generate and share secret Elliptic Curve (EC) key to encrypt and protect the routing authentication parameters. …”
Get full text
Article -
12
Enhancing secrecy using hybrid elliptic curve cryptography and Diffie Hellman key exchange approach and Young's double slit experiment optimizer based optimized cross layer in multihop wireless network
Published 2024-02-01“…The secrecy of the network can be enhanced with the proposed innovative approach known as Hybrid Elliptic Curve Cryptography and Diffie Hellman Key Exchange (HECC-DH). This greatly enhances data integrity and security by offering dual authentications with key exchange techniques. …”
Get full text
Article -
13
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
Published 2024-01-01Subjects: “…Diffie–Hellman key exchange…”
Get full text
Article -
14
SYMMETRIC ENCRYPTION USING PRE-SHARED PUBLIC PARAMETERS FOR A SECURE TFTP PROTOCOL
Published 2017-01-01Subjects: Get full text
Article -
15
A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks
Published 2024-02-01Subjects: Get full text
Article -
16
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks
Published 2020-11-01Subjects: Get full text
Article -
17
A Novel Conservative Chaotic System Involved in Hyperbolic Functions and Its Application to Design an Efficient Colour Image Encryption Scheme
Published 2023-07-01Subjects: Get full text
Article -
18
Design of Secure Chatting Application with End to End Encryption for Android Platform
Published 2017-06-01Subjects: “…android, chatting application, ecdh (elliptic curve diffie hellman key exchange), aes (advanced encryption standard), rc4 (rivest cipher 4)…”
Get full text
Article -
19
APPLICATION OF LAMPORT DIGITAL SIGNATURE SCHEME INTO THE STATION-TO-STATION PROTOCOL
Published 2022-10-01Subjects: Get full text
Article -
20
Chaotic asymmetric encryption process for data security.
Published 2008“…Disclosed is a method and apparatus for a chaotic asymmetric encryption system that is based on a mathematically proven chaotic dynamical system, the ergodic property of chaotic maps, conventional Diffie-Hellman key exchange procedure, a modified Diffie-Hellman key exchange procedure and a public key which is any number that could be chosen from the interval 0,1. …”
Patent