| Document Date: 2013-06-04 22:24:52 Open Document File Size: 424,81 KBShare Result on Facebook
City Paris / / Company Goldreich and Lindell / Ym / / Country France / / Currency pence / / / IndustryTerm insecure solutions / on-line exhaustive search / probabilistic algorithms / off-line exhaustive search / elegant solution / on-line attacks / Online publication / brute-force on-line exhaustive search attack / computing / password-based key exchange protocols / exhaustive search attack / exhaustive search / secure password-based protocols / trapdoor hard-to-invert isomorphisms generation algorithm / zero-knowledge proof systems / samplable finite groups / / Organization Ecole Normale Sup´erieure / International Association for Cryptologic Research Trapdoor Hard-to-Invert Group Isomorphisms and Their Application / / Person Dario Catalano / David Pointcheval / Rabin / Matthew Franklin / Thomas Pornin Cryptolog / / Position random-oracle model / and very intricate / / SportsLeague International Association / / Technology encryption / password-based protocols / trapdoor hard-to-invert isomorphisms generation algorithm / cryptography / public key / two probabilistic algorithms / password-based key exchange protocols / private key / secret key / same symmetric encryption / simulation / Inv algorithm / secure password-based protocols / interactive protocol / so-called Encrypted Key Exchange protocol / resulting protocol / /
SocialTag |