<--- Back to Details
First PageDocument Content
Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography
Date: 2003-12-20 20:23:11
Finite fields
Computational hardness assumptions
Diffie–Hellman key exchange
Key-agreement protocol
Diffie–Hellman problem
ID-based encryption
XTR
Key exchange
Digital signature
Cryptography
Cryptographic protocols
Public-key cryptography

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 114,70 KB

Share Document on Facebook

Similar Documents

New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling Wun-Tat Chan1 Tak-Wah Lam1 Kin-Shing Liu1 Prudence W.H. Wong2 1  Department of Computer Science, University of Hong Kon

New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling Wun-Tat Chan1 Tak-Wah Lam1 Kin-Shing Liu1 Prudence W.H. Wong2 1 Department of Computer Science, University of Hong Kon

DocID: 1rsvR - View Document

BOOKS FROM THE GET 800 COLLECTION 28 SAT Math Lessons to Improve Your Score in One Month Beginner Course Intermediate Course Advanced Course 320 SAT Math Problems Arranged by Topic and Difficulty Level

BOOKS FROM THE GET 800 COLLECTION 28 SAT Math Lessons to Improve Your Score in One Month Beginner Course Intermediate Course Advanced Course 320 SAT Math Problems Arranged by Topic and Difficulty Level

DocID: 1rkcC - View Document

PDF Document

DocID: 1rcT4 - View Document

Improved Randomized On-Line Algorithms for the List Update Problem Susanne Albers Abstract  The best randomized

Improved Randomized On-Line Algorithms for the List Update Problem Susanne Albers Abstract The best randomized

DocID: 1r8O0 - View Document

Algorithmic Number Theory MSRI Publications Volume 44, 2008 Four primality testing algorithms RENE´ SCHOOF

Algorithmic Number Theory MSRI Publications Volume 44, 2008 Four primality testing algorithms RENE´ SCHOOF

DocID: 1qY4T - View Document