A New Scheme for Key Exchange (original) (raw)
Related papers
A Review Based Study of Key Exchange Algorithms
An Approach to Cryptosystem through a Proposed and Secured Protocol
International Journal of Computer Applications, 2012
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Lecture Notes in Computer Science, 2001
A novel process for key exchange avoiding man-inmiddle attack
2012
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
A Study on Asymmetric Key Exchange
2012
Protocols for symmetric secret key establishment: Modern approach
Vojnotehnicki glasnik
A Novel Technique for Secure Communication in Cryptography
IJARCCE, 2017
Design and Implementation of a Secure Communication Protocol
International Journal of Electrical and Computer Engineering (IJECE)
International Journal of Electrical and Computer Engineering (IJECE), 2018
An Efficient Two-Party Identity-Based Key Exchange Protocol
Informatica
A comparative survey of symmetric and asymmetric key cryptography
A Comparison Study on Key Exchange-Authentication Protocol
ijcaonline.org
Efficient and provably secure key agreement
IFIP Advances in Information and Communication Technology, 1996
A Study on Diffie-Hellman Key Exchange Protocols
International Journal of Pure and Apllied Mathematics, 2017
A Cryptographic Keys Transfer Protocol for Secure Communicating Systems
Key management with cryptography
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
2018
Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet
2004
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications, 2007
On simple and secure key distribution
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93, 1993
An algorithm for the generation and exchange of cryptographic secret keys over public channels
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
Implementation of an eCK-secure Key Exchange Protocol for OpenSSL
International Journal on Advanced Science, Engineering and Information Technology
Analysis of Key Exchange Protocols using Session Keys
Secure Communication Using Encryption, Challenges and O
Secure Session Key sharing Using Public Key Cryptography
Anjali Gupta, Muzzammil Hussain
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
Extended Diffie-Hellman Algorithm for Key Exchange and Management
2013
An Efficient Secure Key Management in Mobile Ad Hoc Networks
On the security of public key protocols
Information Theory, IEEE Transactions on, 1983