Back to Results
First PageMeta Content
Public-key cryptography / One-way function / Trapdoor function / Password-authenticated key agreement / Random oracle / PP / NP / Oracle machine / RSA / Cryptography / Cryptographic protocols / Cryptographic hash functions


J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group
Add to Reading List

Document Date: 2013-06-04 22:24:52


Open Document

File Size: 424,81 KB

Share Result on Facebook

City

Paris / /

Company

Goldreich and Lindell / Ym / /

Country

France / /

Currency

pence / /

/

IndustryTerm

insecure solutions / on-line exhaustive search / probabilistic algorithms / off-line exhaustive search / elegant solution / on-line attacks / Online publication / brute-force on-line exhaustive search attack / computing / password-based key exchange protocols / exhaustive search attack / exhaustive search / secure password-based protocols / trapdoor hard-to-invert isomorphisms generation algorithm / zero-knowledge proof systems / samplable finite groups / /

Organization

Ecole Normale Sup´erieure / International Association for Cryptologic Research Trapdoor Hard-to-Invert Group Isomorphisms and Their Application / /

Person

Dario Catalano / David Pointcheval / Rabin / Matthew Franklin / Thomas Pornin Cryptolog / /

Position

random-oracle model / and very intricate / /

SportsLeague

International Association / /

Technology

encryption / password-based protocols / trapdoor hard-to-invert isomorphisms generation algorithm / cryptography / public key / two probabilistic algorithms / password-based key exchange protocols / private key / secret key / same symmetric encryption / simulation / Inv algorithm / secure password-based protocols / interactive protocol / so-called Encrypted Key Exchange protocol / resulting protocol / /

SocialTag