AbstractThe Internet Key Exchange (IKE) protocol is most widely used as a secure key exchange protocol to exchange key materials and negotiate security associations between two security gateways for any secure communications over Internet. However, the original IKE is too flexible, complex and weak to denial-of-service (DoS) attack; several enhanced IKE version have been proposed to replace the original one. In this paper, an elliptic curve cryptography (ECC) based and certificate less IKE protocol is proposed. It eliminates the use of certificates for authentication, replaces the RSA based Diffie-Hellman (DH) key exchange by Elliptic Curve Diffie-Hellman (ECDH) key exchange, and instead of cookies, hash value of initiator's public key, ide...
A key component of the IP Security architecture is the Internet Key Exchange protocol. IKE is invoke...
Abstract—The paper aims in providing a securely communicating of data between the devices which are ...
The Menezes-Qu-Vanstone (MQV) protocol has been used widely to provide high security while using low...
AbstractThe Internet Key Exchange (IKE) protocol is most widely used as a secure key exchange protoc...
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange...
A PKI (public key infrastructure) enables users of a basically unsecure public network to securely a...
Many public-key-based key setup and key agreement protocols already exist and have been implemented ...
In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on ...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
Exchange (IKE) Protocol. This protocol is used to create and maintain Internet Protocol Security (IP...
Cryptography is the study of techniques for ensuring the secrecy and authentication of the informati...
With the emerging of technology, there are many applications that require secure communication, for ...
Empirical thesis.Bibliography: pages 205-207.1. Introduction -- 2. Topic background -- 3. Mathematic...
Exchange protocol (IKE) [1], a key exchange protocol. The main purpose of its development is to prov...
The main goal of this thesis is to articulate and to prove security properties of the key exchange p...
A key component of the IP Security architecture is the Internet Key Exchange protocol. IKE is invoke...
Abstract—The paper aims in providing a securely communicating of data between the devices which are ...
The Menezes-Qu-Vanstone (MQV) protocol has been used widely to provide high security while using low...
AbstractThe Internet Key Exchange (IKE) protocol is most widely used as a secure key exchange protoc...
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange...
A PKI (public key infrastructure) enables users of a basically unsecure public network to securely a...
Many public-key-based key setup and key agreement protocols already exist and have been implemented ...
In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on ...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
Exchange (IKE) Protocol. This protocol is used to create and maintain Internet Protocol Security (IP...
Cryptography is the study of techniques for ensuring the secrecy and authentication of the informati...
With the emerging of technology, there are many applications that require secure communication, for ...
Empirical thesis.Bibliography: pages 205-207.1. Introduction -- 2. Topic background -- 3. Mathematic...
Exchange protocol (IKE) [1], a key exchange protocol. The main purpose of its development is to prov...
The main goal of this thesis is to articulate and to prove security properties of the key exchange p...
A key component of the IP Security architecture is the Internet Key Exchange protocol. IKE is invoke...
Abstract—The paper aims in providing a securely communicating of data between the devices which are ...
The Menezes-Qu-Vanstone (MQV) protocol has been used widely to provide high security while using low...