A New Scheme for Key Exchange (original) (raw)

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

An Approach to Cryptosystem through a Proposed and Secured Protocol

shafiqul abidin

International Journal of Computer Applications, 2012

View PDFchevron_right

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

Ran Canetti

Lecture Notes in Computer Science, 2001

View PDFchevron_right

A novel process for key exchange avoiding man-inmiddle attack

Prof Barun Biswas

2012

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

A Study on Asymmetric Key Exchange

Prof.d.s.r. Murthy

2012

View PDFchevron_right

Protocols for symmetric secret key establishment: Modern approach

Milan Milosavljevic

Vojnotehnicki glasnik

View PDFchevron_right

A Novel Technique for Secure Communication in Cryptography

Sumit Chaudhary

IJARCCE, 2017

View PDFchevron_right

Design and Implementation of a Secure Communication Protocol

International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2018

View PDFchevron_right

An Efficient Two-Party Identity-Based Key Exchange Protocol

Yuh-Min Tseng

Informatica

View PDFchevron_right

A comparative survey of symmetric and asymmetric key cryptography

nagaraj naik

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

Efficient and provably secure key agreement

V. Chrissikopoulos

IFIP Advances in Information and Communication Technology, 1996

View PDFchevron_right

A Study on Diffie-Hellman Key Exchange Protocols

M R Mishra

International Journal of Pure and Apllied Mathematics, 2017

View PDFchevron_right

A Cryptographic Keys Transfer Protocol for Secure Communicating Systems

Traian MUNTEAN

View PDFchevron_right

Key management with cryptography

Roohi Ali

View PDFchevron_right

A Public Key Exchange Cryptosystem Based on Ideal Secrecy

Virendra Sule

2018

View PDFchevron_right

Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet

Ashraf Masood

2004

View PDFchevron_right

Secure and efficient key management in mobile ad hoc networks

Jie Wu

Journal of Network and Computer Applications, 2007

View PDFchevron_right

On simple and secure key distribution

Jennifer Seberry

Proceedings of the 1st ACM conference on Computer and communications security - CCS '93, 1993

View PDFchevron_right

An algorithm for the generation and exchange of cryptographic secret keys over public channels

Milan Milosavljevic

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

Implementation of an eCK-secure Key Exchange Protocol for OpenSSL

Nishen Peiris

International Journal on Advanced Science, Engineering and Information Technology

View PDFchevron_right

Analysis of Key Exchange Protocols using Session Keys

Pranav Vyas

View PDFchevron_right

Secure Communication Using Encryption, Challenges and O

SDIWC Organization

View PDFchevron_right

Secure Session Key sharing Using Public Key Cryptography

Anjali Gupta, Muzzammil Hussain

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Konstantinos Chalkias

Information Security and …, 2008

View PDFchevron_right

Extended Diffie-Hellman Algorithm for Key Exchange and Management

Akhil Kaushik

2013

View PDFchevron_right

An Efficient Secure Key Management in Mobile Ad Hoc Networks

Nasurudeen Ahamed N

View PDFchevron_right

On the security of public key protocols

nabil benhamza

Information Theory, IEEE Transactions on, 1983

View PDFchevron_right