Diffie–Hellman problem

Results: 86



#Item
1The Twin Diffie-Hellman Problem and Applications David Cash1 Eike Kiltz2  Victor Shoup3

The Twin Diffie-Hellman Problem and Applications David Cash1 Eike Kiltz2 Victor Shoup3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-10 15:46:31
    2Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

    Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

    Add to Reading List

    Source URL: 2010.eccworkshop.org

    Language: English - Date: 2010-10-25 19:46:00
    31  On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

    1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    4THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

    THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2015-05-02 08:19:13
    5Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

    Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

    Add to Reading List

    Source URL: book.huihoo.com

    Language: English - Date: 2006-07-27 09:21:33
    6Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

    Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    7This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2011-07-10 02:35:13
    8VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

    VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

    Add to Reading List

    Source URL: www.meganet.com

    Language: English - Date: 2014-10-24 18:00:43
    9Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

    Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-20 07:04:42
    10VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

    VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

    Add to Reading List

    Source URL: www.meganet.com

    Language: English - Date: 2014-10-24 18:00:57