<--- Back to Details
First PageDocument Content
Cryptography / Abstract algebra / Algebra / Computational hardness assumptions / Finite fields / DiffieHellman problem / Group theory / Elliptic curve cryptography / Provable security / Whitfield Diffie / DiffieHellman key exchange / Elliptic curve
Date: 2010-10-25 19:46:00
Cryptography
Abstract algebra
Algebra
Computational hardness assumptions
Finite fields
DiffieHellman problem
Group theory
Elliptic curve cryptography
Provable security
Whitfield Diffie
DiffieHellman key exchange
Elliptic curve

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Add to Reading List

Source URL: 2010.eccworkshop.org

Download Document from Source Website

File Size: 943,06 KB

Share Document on Facebook

Similar Documents

Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign,  Carmela Troncoso, Alfredo Rial†

Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

DocID: 1vhNd - View Document

Provable post-quantum security Renato Renner	 
 Institute for Theoretical Physics

Provable post-quantum security Renato Renner Institute for Theoretical Physics

DocID: 1tPu6 - View Document

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

DocID: 1ttqA - View Document

How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

DocID: 1sE8L - View Document

Practice-Oriented Provable Security and the Social Construction of Cryptography Phillip Rogaway∗ May 22, 2009†  Abstract

Practice-Oriented Provable Security and the Social Construction of Cryptography Phillip Rogaway∗ May 22, 2009† Abstract

DocID: 1rCW0 - View Document