First Page | Document Content | |
---|---|---|
Date: 2017-09-13 08:39:05Cryptography Algebra Abstract algebra Group theory Computational hardness assumptions DiffieHellman key exchange Cyclic group Logjam Generating set of a group Subgroup Whitfield Diffie Computational DiffieHellman assumption | Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ UniAdd to Reading ListSource URL: www.seas.upenn.eduDownload Document from Source WebsiteFile Size: 294,95 KBShare Document on Facebook |
ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 1: Group Theory 1DocID: 1xVrN - View Document | |
Group Henzinger Software Systems Theory Systems Biology Group membersDocID: 1xV3x - View Document | |
Lecture notes: Basic group and representation theory Thomas Willwacher February 27, 2014 2DocID: 1xUQE - View Document | |
SPNs: Network Reconstruction Theory and Speedup Using Neural Networks Balaji Prabhakar and Mendel Rosenblum Self-‐Programming Networks Research Group StanfDocID: 1xTIn - View Document | |
XFindBugs: eXtended FindBugs for AspectJ Haihao Shen, Sai Zhang, Jianjun Zhao, Jianhong Fang, Shiyuan Yao Software Theory and Practice Group (STAP) Shanghai Jiao Tong University, China A codeDocID: 1xTFA - View Document |