Date: 2016-04-23 00:53:29Finite fields Group theory Logarithms Public-key cryptography Computer algebra Discrete logarithm CantorZassenhaus algorithm Index calculus algorithm Baby-step giant-step Exponentiation DiffieHellman key exchange Algorithm | | Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)Add to Reading ListSource URL: www.luke.maurits.id.auDownload Document from Source Website File Size: 593,29 KBShare Document on Facebook
|