Improving the Diffie-Hellman Secure Key Exchange (original) (raw)

Extended Diffie-Hellman Algorithm for Key Exchange and Management

Akhil Kaushik

2013

View PDFchevron_right

An Alternative Diffie-Hellman Protocol

Eric Järpe

Cryptography, 2020

View PDFchevron_right

A Study on Diffie-Hellman Key Exchange Protocols

M R Mishra

International Journal of Pure and Apllied Mathematics, 2017

View PDFchevron_right

The Twin Diffie-Hellman Problem and Applications

David Cash

Journal of Cryptology, 2009

View PDFchevron_right

A Secure Wireless Communication Protocol using Diffie - Hellman Key Exchange

Varun Shukla

International Journal of Computer Applications, 2015

View PDFchevron_right

An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks

Syed Saqlain

International Journal of Distributed Sensor Networks

View PDFchevron_right

Diffie-Hellman Technique Extended to Efficient and Simpler Group Key Distribution Protocol

Nistala Murthy

International Journal of Computer Applications, 2010

View PDFchevron_right

Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

Muath Alshaikh

Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021

View PDFchevron_right

DHAES: An encryption scheme based on the Diffie���Hellman problem

Phillip Rogaway

1999

View PDFchevron_right

SPDH - A Secure Plain Diffie-Hellman Algorithm

Birger Andersen

J. Cyber Secur. Mobil., 2012

View PDFchevron_right

Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security

Ghaith Alomari

Turkish Journal of Computer and Mathematics Education (TURCOMAT)

View PDFchevron_right

Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function

Editor Ijasre

International Journal of Advances in Scientific Research and Engineering (ijasre), 2019

View PDFchevron_right

Comparison of the complexity of Diffie–Hellman and discrete logarithm problems

Михаил Черепнев

Journal of Computer Virology and Hacking Techniques, 2020

View PDFchevron_right

The Performance of Group Diffie-Hellman Paradigms

Hans-peter Bischof

Icwn, 2004

View PDFchevron_right

Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman

Samiksha Sharma

International Journal of Security and Its Applications, 2017

View PDFchevron_right

On the bit security of the Diffie-Hellman key

Ian Blake

Applicable Algebra in Engineering, Communication and Computing, 2006

View PDFchevron_right

Attack on ``Strong Diffie-Hellman-DSA KE" and Improvement

Mamadou Ghouraissiou Camara

Journal of Mathematics Research, 2013

View PDFchevron_right

Weak keys of the Diffie Hellman key exchange II: Pairing based schemes on elliptic curves

Virendra Sule

View PDFchevron_right

A Novel Text Encryption Algorithm using enhanced Diffie Hellman and AES

International Journal of Advance Research in Computer Science and Management Studies [IJARCSMS] ijarcsms.com

View PDFchevron_right

A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique

Jayaprakash Kar

2011

View PDFchevron_right

Sieving technique to solve the discrete log hard problem in Diffie-Hellman Key Exchange

Mohd Anuar Mat Isa

View PDFchevron_right

Elliptic curve Cryptography and Diffie-Hellman Key exchange

IOSR JM

View PDFchevron_right

Securing Data on Transmission from Man-In-The-Middle Attacks Using Diffie Hell-Man Key Exchange Encryption Mechanism

THE IJES Editor

View PDFchevron_right

Analysis of El-Gamal with Diffie-Hellman Scheme using Hash-Function for Message Security

Neetesh Saxena

Student Conference on Engineering and Systems (SCES 2012) Allahabad India, 2012

View PDFchevron_right

Variations of Diffie-Hellman Problem

feng bao

2003

View PDFchevron_right

An Implementation Approach of Ecdlp-Based Diffie-Hellman Using Vb.Net

samta gajbhiye

2013

View PDFchevron_right

Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem

Manju Sanghi

International Journal of Network Security, 2013

View PDFchevron_right

A secure deniable authentication protocol based on Bilinear Diffie Hellman algorithm, Cryptology eprint Archive

Jayaprakash Kar

2010

View PDFchevron_right

A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm

Jayaprakash Kar

View PDFchevron_right

An Approach to Cryptosystem through a Proposed and Secured Protocol

Shafiqul Abidin

International Journal of Computer Applications, 2012

View PDFchevron_right