Abstract. We show how the theory of real quadratic congruence function fields can be used to produce a secure key distribution protocol. The technique is similar to that advocated by Diffie and Hellman in 1976, but instead of making use of a group for its underlying structure, makes use of a structure which is "almost " a group. The method isan extension f the recent ideas of Scheidler, Buchmann a d Williams, but, because it is implemented in these function fields, several of the difficulties with their protocol can be eliminated. A detailed description f the protocol is provided, together with a discussion fthe algorithms needed to effect it. 1
Abstract. This paper presents a secure constant-round password-based group key exchange protocol in ...
Abstract. This paper presents a secure constant-round password-based group key exchange protocol in ...
In the paper we study parallel key exchange among multiple parties. The status of parallel key excha...
We show how the theory of real quadratic congruence function fields can be used to produce a secure ...
In [11] Scheidler, Stein and Williams proposed a key exchange protocol which makes use of the set of...
We present a key exchange scheme similar to that of Diffie and Hellman using the infrastructure of q...
Abstract. To date, the only non-group structure that has been suitably employed as the key space for...
We describe here a key-exchange protocol over real quadratic fields. This is accompanied by all the ...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Key exchange or key establishment is any process in cryptography by which users are able to share or...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Abstract. This paper presents a secure constant-round password-based group key exchange protocol in ...
Abstract. This paper presents a secure constant-round password-based group key exchange protocol in ...
In the paper we study parallel key exchange among multiple parties. The status of parallel key excha...
We show how the theory of real quadratic congruence function fields can be used to produce a secure ...
In [11] Scheidler, Stein and Williams proposed a key exchange protocol which makes use of the set of...
We present a key exchange scheme similar to that of Diffie and Hellman using the infrastructure of q...
Abstract. To date, the only non-group structure that has been suitably employed as the key space for...
We describe here a key-exchange protocol over real quadratic fields. This is accompanied by all the ...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Key exchange or key establishment is any process in cryptography by which users are able to share or...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Abstract. This paper presents a secure constant-round password-based group key exchange protocol in ...
Abstract. This paper presents a secure constant-round password-based group key exchange protocol in ...
In the paper we study parallel key exchange among multiple parties. The status of parallel key excha...