![Finite fields / Computational Diffie–Hellman assumption / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Diffie–Hellman key exchange / Hellman / ElGamal encryption / Whitfield Diffie / XDH assumption / Cryptography / Computational hardness assumptions / Cryptographic protocols Finite fields / Computational Diffie–Hellman assumption / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Diffie–Hellman key exchange / Hellman / ElGamal encryption / Whitfield Diffie / XDH assumption / Cryptography / Computational hardness assumptions / Cryptographic protocols](https://www.pdfsearch.io/img/3c35c7c59e69f1603c4aaf08c1838434.jpg) Date: 2007-07-06 16:33:16Finite fields Computational Diffie–Hellman assumption Diffie–Hellman problem Decisional Diffie–Hellman assumption Diffie–Hellman key exchange Hellman ElGamal encryption Whitfield Diffie XDH assumption Cryptography Computational hardness assumptions Cryptographic protocols | | Workshop on Selected Areas in Cryptography[removed] – 16 august 2002, St. John’s, Newfoundland, Canada) H. Heys and K. Nyberg Eds. Springer-Verlag, LNCS 2595, pages 325–338
Document is deleted from original location. Use the Download Button below to download from the Web Archive.Download Document from Web Archive File Size: 261,17 KB
|