Back to Results
First PageMeta Content
Decisional Diffie–Hellman assumption / Mathematics / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Computational Diffie–Hellman assumption / Computational hardness assumptions / Finite fields / Cryptographic protocols


Advances in Cryptology – Proceedings of Crypto ’07 (August 19–[removed], Santa Barbara, CA) A. Menezes Ed. Springer-Verlag, LNCS 4622, pages 482–499. A generalization of DDH with applications to protocol analysis a
Add to Reading List

Document Date: 2012-11-06 05:29:19


Open Document

File Size: 314,20 KB

Share Result on Facebook

City

Santa Barbara / /

Currency

pence / USD / /

/

Event

Product Recall / Product Issues / /

Facility

Square Exponent / University of Bristol / /

IndustryTerm

secure protocols / possible protocols / cryptographic protocols / keyexchange protocols / probabilistic polynomial-time algorithm / direct and concrete applications / /

Organization

DCSSI Crypto Lab / University of Bristol / European Commission / /

Person

Laurent Mazar / /

Position

author / General / /

Product

Xu / /

Technology

key-exchange protocols / DDH-based key-exchange protocols / provably secure protocols / exchange protocols / possible protocols / probabilistic polynomial-time algorithm / keyexchange protocols / Burmester-Desmedt protocol / /

SocialTag