Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2023.3347422
Abstract: In this paper, D(HE)at, a practical denial-of-service (DoS) attack targeting the finite field Diffie-Hellman (DH) key exchange protocol, is presented, allowing remote users to send non-public keys to the victim, triggering expensive server-side DH modular-exponentiation…
read more here.
Keywords:
attack;
diffie hellman;
key exchange;
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3633843
Abstract: Several lightweight protocols are being developed to secure communication in resource-constrained environments. Ephemeral Diffie-Hellman over COSE (EDHOC) plays a key role in this lightweight protocol family by managing the key establishment process. However, due to…
read more here.
Keywords:
edhoc post;
diffie hellman;
post quantum;
reinventing edhoc ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2019.2899847
Abstract: Recent progress in quantum physics shows that quantum computers may be a reality in the not too distant future. Post-quantum cryptography (PQC) refers to cryptographic schemes that are based on hard problems which are believed…
read more here.
Keywords:
diffie hellman;
supersingular isogeny;
isogeny diffie;
modular multiplication ... See more keywords