Diffie-Hellman key exchange method
A Secure Key Exchange Scheme in Wireless Sensor Networks Using Diffie Hellman
6
ON KEY EXCHANGE METHOD VIA TOPOLOGICAL CONCEPTS
8
Generation of N-party Man-In-Middle Attack for Diffie–Hellman Key Exchange Protocol: A Review
5
Two Level Encryption Decryption by Diffie – Hellman and Elliptic Curve Cryptography with Open ID scenario for Securing Cloud Environment Arti Pandey, Raghvendra Kumar
5
Trust Factor Based Key Distribution Protocol in Hybrid Cloud Environment
16
An Advanced Architecture for Securing Data in Cloud
7
Cryptography: A Comparison of Public Key Systems
12
Performance study on Diffie Hellman Key Exchange Algorithm
10
A Novel Secure Message Transmission Using Elliptic Curve Diffie Hellman Key Exchange Protocol
5
Enhancing Bluetooth Authentication using Diffie Hellman Algorithm
5
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
25
Vol 3, No 1 (2012)
6
Forward Secrecy For Google HTTPS using Elliptic Curve Diffie Hellman Key Exchange Algorithm
7
Abstract . Recently, Coron presented an attack of GGH15 multilinear maps, which breaks the
10
Vol 1, No 7 (2013)
5
MODIFIED HOMOMORPHIC ENCRYPTION ALGORITHM TO SECURE DATA IN CLOUD COMPUTING
8
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
18
An Internet-Wide Analysis of Diffie-Hellman Key Exchange and X.509 Certificates in TLS
97
Combined Cryptographic Standards for Minimizing the Decryption Time of Encrypted Data using E-AES and D-AES
6
A. The Diffie-Hellman protocol
5