First Page | Document Content | |
---|---|---|
Date: 2013-09-12 01:05:36Logarithms Computational hardness assumptions Modular arithmetic Key size Cryptanalysis Pairing-based cryptography Discrete logarithm Public-key cryptography Encryption Cryptography Abstract algebra Mathematics | Add to Reading ListSource URL: www.nict.go.jpDownload Document from Source WebsiteFile Size: 326,94 KBShare Document on Facebook |