<--- Back to Details
First PageDocument Content
Cryptography / Algebra / Abstract algebra / Group theory / Computational hardness assumptions / DiffieHellman key exchange / Cyclic group / Logjam / Generating set of a group / Subgroup / Whitfield Diffie / Computational DiffieHellman assumption
Date: 2017-09-13 08:39:05
Cryptography
Algebra
Abstract algebra
Group theory
Computational hardness assumptions
DiffieHellman key exchange
Cyclic group
Logjam
Generating set of a group
Subgroup
Whitfield Diffie
Computational DiffieHellman assumption

Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

Add to Reading List

Source URL: www.seas.upenn.edu

Download Document from Source Website

File Size: 294,95 KB

Share Document on Facebook

Similar Documents

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN  Joint work with:

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:

DocID: 1r2Hf - View Document

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

DocID: 1qjra - View Document

Approximating the least hypervolume contributor: NP-hard in general, but fast in practice Karl Bringmann1 and Tobias Friedrich2 1

Approximating the least hypervolume contributor: NP-hard in general, but fast in practice Karl Bringmann1 and Tobias Friedrich2 1

DocID: 1q2Qr - View Document

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

DocID: 1pMu4 - View Document

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

DocID: 1mJoe - View Document