elliptic curve Diffie-Hellman

October 2011
Computer Desktop Encyclopedia;10/1/2011, p1
Reference Entry
A type of Diffie-Helman cryptography algorithm that uses elliptic curve cryptography. See Diffie-Hellman and elliptic curve cryptography.


Related Articles

  • ECDH.  // Computer Desktop Encyclopedia;10/1/2011, p1 

    See elliptic curve Diffie-Hellman.

  • ECDH.  // Computer Desktop Encyclopedia;2015, p1 

    See elliptic curve Diffie-Hellman.

  • elliptic curve Diffie-Hellman.  // Computer Desktop Encyclopedia;2015, p1 

    A type of Diffie-Helman cryptography algorithm that uses elliptic curve cryptography. See Diffie-Hellman and elliptic curve cryptography.

  • A SECURE DIFFIE-HELLMAN SCHEMES OVER ELLIPTIC CURVES. Kakish, Malek Jakob // International Journal of Research & Reviews in Applied Sciences;2012, Vol. 10 Issue 1, p98 

    The protection of information technologies is very essential because information technologies play a major role in our information society, such protection includes data and system protection against many kinds of threats or attacks which may lead to lose of money, or lose of reputation and thus...

  • An Approach to Cryptosystem through a Proposed and Secured Protocol. Abidin, Shafiqul; Kumar, Rajeev; Tripathy, A. R. // International Journal of Computer Applications;7/15/2012, Vol. 50, p40 

    The Diffie-Hellman key algorithm was the first proposed public key algorithm by which two parties can communicate with each other without having any prior knowledge of each other over an insecure communication channel proposed by Harn.et.al. Diffie-Hellman key exchange algorithm is the most...

  • A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie-Hellman with privacy preserving public key infrastructure. NARESH, VANKAMAMIDI S.; MURTHY, NISTALA V. E. S. // Sadhana;Oct2015, Vol. 40 Issue 7, p2143 

    In this paper a new two-round authenticated contributory group key agreement based on Elliptic Curve Diffie-Hellman protocol with Privacy Preserving Public Key Infrastructure (PP-PKI) is introduced and is extended to a dynamic authenticated contributory group key agreement with join and leave...

  • Attack on "Strong Diffie-Hellman-DSA KE" and Improvement. Sow, Demba; Camara, Mamadou Ghouraissiou; Sow, Djiby // Journal of Mathematics Research;Mar2014, Vol. 6 Issue 1, p70 

    In this paper, we do a cryptanalyse of the so called "Strong Diffie-Hellman-DSA Key Exchange (briefly: SDHDSA- KE)" and after we propose "Strong Diffie-Hellman-Exponential-Schnnor Key Exchange (briefly: SDH-XSKE)" which is an improvement for efficiency and security. SDH-XS-KE protocol is secure...

  • IMPROVING SECURITY IN INITIAL NETWORK ENTRY PROCESS OF IEEE 802.16. Gandhewar, Pranita K.; Lokulwar, Prasad P. // International Journal on Computer Science & Engineering;2011, Vol. 3 Issue 9, p3327 

    IEEE 802.16 basically designed to provide more security as compared to other wireless networks. It provides many security features to protect the information in the network as well as to protect the network from unauthorized access, still it vulnerable to many attacks. The process, where attack...

  • Microprocessor Implementation of Key Agreement Protocol over the Ring of Multivariate Polynomials. Katvickis, A.; Sakalauskas, E.; Listopadskis, N. // Electronics & Electrical Engineering;2011, Issue 116, p95 

    Efficiency analysis of key agreement protocol with matrices over multivariate polynomial ring is presented. We consider protocol implementation for highly resource-restricted areas. Total number of simple bit operations requires computing common secret key is determined for different...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics