![Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange](https://www.pdfsearch.io/img/fcf617fb2293ab2746ba4b2c0e8b4579.jpg) Date: 2005-12-09 06:49:50Diffie–Hellman problem Key-agreement protocol Public-key cryptography Key exchange Elliptic curve cryptography ID-based encryption Internet Key Exchange Boneh/Franklin scheme Elliptic curve Diffie–Hellman Cryptographic protocols Cryptography Diffie–Hellman key exchange | | Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.CAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 376,22 KBShare Document on Facebook
|