<--- Back to Details
First PageDocument Content
Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size
Date: 2015-08-21 16:58:21
Cryptography
Transport Layer Security
Secure communication
Finite fields
Cryptographic protocols
Public-key cryptography
Logjam
DiffieHellman key exchange
Index calculus algorithm
XTR
Elliptic curve DiffieHellman
Key size

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: aaspring.com

Download Document from Source Website

File Size: 1,32 MB

Share Document on Facebook

Similar Documents

Abstract algebra / Algebra / Mathematics / Group theory / Discrete logarithm / Index calculus algorithm / PohligHellman algorithm / Baby-step giant-step / Limit of a function

A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

DocID: 1qKpq - View Document

Mathematics / Algebra / Logarithms / Polynomial / Index calculus algorithm / Abstract algebra / Computer algebra

On the Function Field Sieve and the Impact of Higher Splitting Probabilities Robert Granger Joint work with Faruk Gölo§lu, Gary McGuire and Jens Zumbrägel

DocID: 1qJsF - View Document

Abstract algebra / Algebra / Group theory / Mathematics / Logarithms / Computational hardness assumptions / Finite fields / Modular arithmetic / Index calculus algorithm / Discrete logarithm / Baby-step giant-step / Elliptic curve

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

DocID: 1qjra - View Document

Group theory / Finite fields / Public-key cryptography / Cryptography / Key management / Discrete logarithm / Index calculus algorithm / ElGamal encryption / Key / XTR / DiffieHellman key exchange / RSA

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

DocID: 1pH9i - View Document

Finite fields / Group theory / Logarithms / Public-key cryptography / Computer algebra / Discrete logarithm / CantorZassenhaus algorithm / Index calculus algorithm / Baby-step giant-step / Exponentiation / DiffieHellman key exchange / Algorithm

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)

DocID: 1obzi - View Document