Back to Results
First PageMeta Content
Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields


Improvement of Ma ni ke ta l .
Add to Reading List

Document Date: 2005-12-09 05:56:33


Open Document

File Size: 416,50 KB

Share Result on Facebook

City

Berlin / Santa Barbara / Springer / /

Company

Fiat / G 2 / Wilson / G 1 / nCr / /

Country

United States / /

Currency

Rs / /

/

Event

FDA Phase / /

Facility

Pub RS =sP / Pub RS / /

IndustryTerm

resolvable solution / remote server / additive cyclic / agreement protocols / sound authenticated key agreement protocol / round protocol / agreement protocol / authentication key agreement protocol / multiplicative cyclic / /

Organization

Department of Information Management / National Tsing Hua University / /

Person

Sam Chou / /

/

Position

mp / rt / /

Product

Franklin / Figure1 / /

ProvinceOrState

New York / /

PublishedMedium

Mathematics of Computation / IEEE Transactions on Information Theory / Lecture Notes in Computer Science / /

Technology

sound authenticated key agreement protocol / encryption / cryptography / public key / authentication key agreement protocol / key agreement protocol / Identity-based encryption / The protocol / smart card / secret key / key agreement protocols / Digital signature / one round protocol / Public-Key Infrastructure / ID-based authentication key agreement protocol / /

SocialTag