Back to Results
First PageMeta Content
Finite fields / Cryptographic protocols / Diffie–Hellman problem / Hellman / XTR / CDH / Diffie–Hellman key exchange / Whitfield Diffie / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions


ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II
Add to Reading List

Document Date: 2010-05-04 11:48:24


Open Document

File Size: 293,20 KB

Share Result on Facebook

City

DDH / /

Company

Inner Automorphism Group / BP / /

Facility

University of Haifa / Shannon Institute / /

Holiday

Assumption / /

IndustryTerm

braid group conjugacy search problem / conjugacy search problem / e-th / /

Organization

Commission of the European Communities / University of Haifa / Katholieke Universiteit Leuven / Shannon Institute / European Commission / /

Person

David Galindo / Vincenzo Iovino / Naomi Benger / Biljana Cubaleska / Nigel Smart / Dario Catalano / Vijay Singh / Benoit Libert / Jorge Villar Santos / Khaled Ouafi / Frantisek Polach / Danny Lynch / Benny Pinkas / Richard Moloney / Hans Loehr / Mario Di Raimondo / Steven Galbraith / Jens Hermans / Dario Fiore / Richard Lindner / Steve Williams / Manuel Charlemagne / Michael Schneider / David Conti / /

Position

SVP / Cryptography Editor / years Lead contractor / /

Technology

Cryptography / SDH / DLP / /

SocialTag