<--- Back to Details
First PageDocument Content
Cryptographic protocols / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / XTR / Discrete logarithm / ElGamal encryption / Subliminal channels / RSA / Cryptography / Computational hardness assumptions / Finite fields
Date: 2006-07-27 09:21:33
Cryptographic protocols
Public-key cryptography
Diffie–Hellman problem
Diffie–Hellman key exchange
XTR
Discrete logarithm
ElGamal encryption
Subliminal channels
RSA
Cryptography
Computational hardness assumptions
Finite fields

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Add to Reading List

Source URL: book.huihoo.com

Download Document from Source Website

File Size: 143,86 KB

Share Document on Facebook

Similar Documents

On Subliminal Channels in Encrypt-on-Cast Voting Systems Ariel J. Feldman Princeton University Josh Benaloh Microsoft Research

On Subliminal Channels in Encrypt-on-Cast Voting Systems Ariel J. Feldman Princeton University Josh Benaloh Microsoft Research

DocID: 1ecjT - View Document

On Subliminal Channels in Encrypt-on-Cast Voting Systems

On Subliminal Channels in Encrypt-on-Cast Voting Systems

DocID: 1cUaM - View Document

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

DocID: 19uqQ - View Document

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Lattice-based Fault Attacks on DSA - Another Possible Strategy

DocID: YwzC - View Document

Cryptographic Insecurity of the Test&Repeat Paradigm

Cryptographic Insecurity of the Test&Repeat Paradigm

DocID: YuRQ - View Document