Back to Results
First PageMeta Content
Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography


ID-based Authenticated Two Round Multi-Party Key Agreement
Add to Reading List

Document Date: 2003-12-20 20:23:11


Open Document

File Size: 114,70 KB

Share Result on Facebook
UPDATE