Skip to content

References

Purpose: List primary sources used for cryptographic foundations and project context.
  • Diffie, W., & Hellman, M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
  • Boneh, D., & Shparlinski, I. E. (2001). On the unpredictability of bits of ECDH. CRYPTO 2001.
  • Haakegaard, R., & Lang, J. (2015). The Elliptic Curve Diffie-Hellman (ECDH). UCSB.
  • Ambatipudi, S. (2024). Cryptographic advancements enabled by Diffie-Hellman. ISACA Journal.
  • Odlyzko, A. M. (2014). Discrete Logarithms in Finite Fields and Their Cryptographic Significance.
  • Krawczyk, H. (2005). HMQV: A High-Performance Secure Diffie-Hellman Protocol.
  • Alomran, S. F. (2025). CS285 Secure Key Exchange Project (Diffie-Hellman Simulation).
    Repository: GitHub Project