Diffie–Hellman problem

Results: 86



#Item
1

The Twin Diffie-Hellman Problem and Applications David Cash1 Eike Kiltz2 Victor Shoup3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-10 15:46:31
    2Cryptography / Abstract algebra / Algebra / Computational hardness assumptions / Finite fields / DiffieHellman problem / Group theory / Elliptic curve cryptography / Provable security / Whitfield Diffie / DiffieHellman key exchange / Elliptic curve

    Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

    Add to Reading List

    Source URL: 2010.eccworkshop.org

    Language: English - Date: 2010-10-25 19:46:00
    3Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

    1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    4Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

    THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2015-05-02 08:19:13
    5Cryptographic protocols / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / XTR / Discrete logarithm / ElGamal encryption / Subliminal channels / RSA / Cryptography / Computational hardness assumptions / Finite fields

    Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

    Add to Reading List

    Source URL: book.huihoo.com

    Language: English - Date: 2006-07-27 09:21:33
    6ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

    Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    7FEAL / Lecture Notes in Computer Science / International Cryptology Conference / Computational hardness assumptions / Cryptographic protocols / Diffie–Hellman problem / Index of cryptography articles / Cryptography / LOKI / Data Encryption Standard

    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2011-07-10 02:35:13
    8Key size / Public-key cryptography / Whitfield Diffie / Key-agreement protocol / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

    VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

    Add to Reading List

    Source URL: www.meganet.com

    Language: English - Date: 2014-10-24 18:00:43
    9Computational hardness assumptions / Finite fields / Decisional Diffie–Hellman assumption / Diffie–Hellman problem / Vector space / Matrix / Kalman filter / Principal component analysis / Algebra / Mathematics / Cryptography

    Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-20 07:04:42
    10Key size / Whitfield Diffie / Public-key cryptography / Key-agreement protocol / Advanced Encryption Standard / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

    VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

    Add to Reading List

    Source URL: www.meganet.com

    Language: English - Date: 2014-10-24 18:00:57
    UPDATE