Back to Results
First PageMeta Content
XTR / Normal distribution / Structure / Diffie–Hellman key exchange / YAK / Cryptographic protocols / Mathematics / Finite fields


1 Strongly Secure Authenticated Key Exchange from Ideal Lattices Xiaopeng Yang and Wenping Ma
Add to Reading List

Document Date: 2015-04-12 05:00:54


Open Document

File Size: 249,08 KB

Share Result on Facebook

City

Terms Lattice / /

Company

State Key Laboratory / Integrated Service Networks / /

Country

United States / /

/

Facility

State Key Laboratory of Integrated Service Networks / Xidian University / /

IndustryTerm

secure networks / random product / public key infrastructure / quantum computing technology / then computing x′i / cryptographic protocol / /

Organization

Then / National Security Agency / A. / US government / B. / Xidian University / /

Position

extractor / strong randomness extractor / /

Product

Landau / /

Technology

encryption / Cryptography / public key infrastructure / public key / key exchange protocol / cryptographic KE protocol / PKI / cryptographic protocol / MQV protocol / private key / KE protocols / secret key / wonderful Diffie-Hellman KE Protocol / quantum computing technology / HMQV protocol / CMQV protocol / proposed protocol / AKE protocol / /

SocialTag