Articles with "diffie hellman" as a keyword



D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2023.3347422

Abstract: In this paper, D(HE)at, a practical denial-of-service (DoS) attack targeting the finite field Diffie-Hellman (DH) key exchange protocol, is presented, allowing remote users to send non-public keys to the victim, triggering expensive server-side DH modular-exponentiation… read more here.

Keywords: attack; diffie hellman; key exchange;

Reinventing EDHOC for the Post-Quantum Era

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3633843

Abstract: Several lightweight protocols are being developed to secure communication in resource-constrained environments. Ephemeral Diffie-Hellman over COSE (EDHOC) plays a key role in this lightweight protocol family by managing the key establishment process. However, due to… read more here.

Keywords: edhoc post; diffie hellman; post quantum; reinventing edhoc ... See more keywords

Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2019.2899847

Abstract: Recent progress in quantum physics shows that quantum computers may be a reality in the not too distant future. Post-quantum cryptography (PQC) refers to cryptographic schemes that are based on hard problems which are believed… read more here.

Keywords: diffie hellman; supersingular isogeny; isogeny diffie; modular multiplication ... See more keywords