Back to Results
First PageMeta Content
Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / ElGamal encryption / XTR / RSA / Diffie–Hellman problem / Computational Diffie–Hellman assumption / Discrete logarithm / Cryptography / Public-key cryptography / Cryptographic protocols


CS255: Cryptography and Computer Security Winter 2003 Assignment #3 Due: Monday, March 3rd, 2003 at 5pm in CS255 box next to Gates 182.
Add to Reading List

Document Date: 2003-02-18 23:13:10


Open Document

File Size: 53,30 KB

Share Result on Facebook

IndustryTerm

above protocol / generation algorithm / computing / /

Organization

Ai / /

Person

Ai / /

ProvinceOrState

North Carolina / /

Technology

encryption / above protocol / Use algorithm / public key system / Cryptography / private key / public key encryption / key generation algorithm / public key / /

SocialTag