Also found in: Encyclopedia.
ECDHElliptic Curve Diffie-Hellman
ECDHElliptic Curve Diffie Hellman
ECDHEntente Cycliste du Houdanais (French cycle club)
ECDHErie County Department of Health (Pennsylvania)
ECDHEuropean Car Distribution Handbook
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
For MSP430, we used our lightweight implementation of elliptic curve primitives and ECDH algorithm.
(ii) ECDSA is used to prevent man-in-the-middle attack that ECDH suffers from, to realize the mutual authentication.
At the end of the authentication scheme there is a key establishment part which extends the security strength of the standard ECDH key agreement by using mutually authenticated keying materials (i.e., [Cert.sub.U] and s).
FA stores the [ID.sub.HA] and aP received from MU for further communication, selects a random number b, and computes the bP value on E using ECDH. FA then sends [ID.sub.FA], A, [c.sub.1], [c.sub.2], aP, bP, and [N'.sub.MU] to HA.
Figure 4 represents the simulation results for ECDH based key management scheme [6].
The Communication and computation of tree based ECDH depends on trees height, balance of key tree, location of joining tree and leaving nodes.
[10] Yoon EJ, Yoo KY., "Cryptanalysis of DS-SIP authentication scheme using ECDH [C]," in Proc.
propose a session key establishment scheme for clustered sensor networks that is based on elliptic curve Diffie-Hellman (ECDH) key exchange and hash chain.