Key Exchange Algorithm
Key Facts
Abbreviation
KEA
Pronunciation
/ki ɪksˈʧeɪnʤ ˈælgərˌɪðəm/
Category
Governmental
Related Field
Military
Examples in Context
- The Kerberos protocol is analyzed, and there is guessing attack defects. DH key exchange algorithm and public-key cryptosystem are introduced to Kerberos authentication protocol.
- Describes the key exchange algorithm based on the discrete logarithm problem of elliptic curve over Galois Field Gives the conditions to construct a secure elliptic curve crypto-system after analyzing the crisis of this crypto-system.
- Secondly, the principle of ECC, including the math foundation and basic conception are expounded. Data encryption algorithm, key exchange algorithm and digital signature algorithm based on the elliptic curve encrypt scheme are analyzed.
- The use of graphical topology transformation, improved key exchange algorithm and homotopy projection mapping completed the initial key into a dynamic password. 4.
- A new method for securing transmission by use of DH ( Diffie-Hellman ) key exchange algorithm and DES ( Data Encryption Standard ) algorithm to transfer the DH parameters directly is presented.
Other meanings of KEA
Keane, Inc.
Business
Kyrene Education Association
Community
Known Exponent Attack
Computing
Keisah, Indonesia
Regional
Kathwari Ethan Allen
Community
Knowledge of Exponent Assumption
Academic
Kea Petroleum
Business