<--- Back to Details
First PageDocument Content
Cryptographic protocols / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / XTR / Discrete logarithm / ElGamal encryption / Subliminal channels / RSA / Cryptography / Computational hardness assumptions / Finite fields
Date: 2006-07-27 09:21:33
Cryptographic protocols
Public-key cryptography
Diffie–Hellman problem
Diffie–Hellman key exchange
XTR
Discrete logarithm
ElGamal encryption
Subliminal channels
RSA
Cryptography
Computational hardness assumptions
Finite fields

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Add to Reading List

Source URL: book.huihoo.com

Download Document from Source Website

File Size: 143,86 KB

Share Document on Facebook

Similar Documents

The Twin Diffie-Hellman Problem and Applications David Cash1 Eike Kiltz2  Victor Shoup3

The Twin Diffie-Hellman Problem and Applications David Cash1 Eike Kiltz2 Victor Shoup3

DocID: 1mLxm - View Document

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

DocID: 1miS9 - View Document

1  On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

DocID: 1lnSV - View Document

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

DocID: 1gs9P - View Document

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

DocID: 19uqQ - View Document