<--- Back to Details
First PageDocument Content
Finite fields / Cryptographic protocols / Electronic commerce / Diffie–Hellman key exchange / XTR / ElGamal encryption / RSA / Computational Diffie–Hellman assumption / Discrete logarithm / Cryptography / Public-key cryptography / Computational hardness assumptions
Date: 2004-02-22 02:05:11
Finite fields
Cryptographic protocols
Electronic commerce
Diffie–Hellman key exchange
XTR
ElGamal encryption
RSA
Computational Diffie–Hellman assumption
Discrete logarithm
Cryptography
Public-key cryptography
Computational hardness assumptions

CS255: Cryptography and Computer Security Winter 2004 Assignment #3 Due: Monday, March 1st, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Download Document from Source Website

File Size: 79,77 KB

Share Document on Facebook

Similar Documents

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

DocID: 1xVSj - View Document

PDF Document

DocID: 1xRwQ - View Document

PDF Document

DocID: 1xu6k - View Document

PDF Document

DocID: 1x9q3 - View Document

PDF Document

DocID: 1x1dn - View Document