Date: 2005-12-09 06:49:50Diffie–Hellman problem Key-agreement protocol Public-key cryptography Key exchange Elliptic curve cryptography ID-based encryption Internet Key Exchange Boneh/Franklin scheme Elliptic curve Diffie–Hellman Cryptographic protocols Cryptography Diffie–Hellman key exchange | | Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.CAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 376,22 KBShare Document on Facebook
|