Diffie–Hellman problem

Results: 86



#Item
51Finite fields / Electronic commerce / Paillier cryptosystem / Okamoto–Uchiyama cryptosystem / Goldwasser–Micali cryptosystem / XTR / ElGamal encryption / Diffie–Hellman problem / RSA / Cryptography / Public-key cryptography / Computational hardness assumptions

A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications Emmanuel Bresson1 , Dario Catalano2 , and David Pointcheval2 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
52Public-key cryptography / Computational hardness assumptions / BLS / Diffie–Hellman problem / Digital signature / XTR / Parity of a permutation / Diffie–Hellman key exchange / Structure / Cryptography / Finite fields / Cryptographic protocols

Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption Jean-Sebastien Coron and David Naccache Gemplus Card International 34, rue Guynemer, Issy-les-Moulineaux, F-92447,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
53Formal methods / Logic in computer science / Electronic design automation / NP-complete problems / Boolean algebra / Boolean satisfiability problem / Field-programmable gate array / Elliptic curve Diffie–Hellman / Xilinx / Theoretical computer science / Electronic engineering / Applied mathematics

An Introduction to Boolean Satisfiability Ian Blumenfeld CyberPoint International 14 May 2013

Add to Reading List

Source URL: www.cyber.umd.edu

Language: English - Date: 2013-05-18 03:11:56
54Cryptographic protocols / Computational hardness assumptions / Whitfield Diffie / Diffie–Hellman key exchange / Diffie–Hellman problem / Digital signature / Random oracle / Standard model / Hellman / Cryptography / Public-key cryptography / Key management

Non-Interactive Key Exchange and Key Assignment Schemes Eduarda Sim˜oes Veloso Freire Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-02-04 17:42:47
55MQV / Key-agreement protocol / Diffie–Hellman key exchange / Perfect forward secrecy / Digital signature / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
56Decisional Diffie–Hellman assumption / Mathematics / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Computational Diffie–Hellman assumption / Computational hardness assumptions / Finite fields / Cryptographic protocols

Advances in Cryptology – Proceedings of Crypto ’07 (August 19–[removed], Santa Barbara, CA) A. Menezes Ed. Springer-Verlag, LNCS 4622, pages 482–499. A generalization of DDH with applications to protocol analysis a

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
57Finite fields / Logarithms / Computational hardness assumptions / Group theory / Diffie–Hellman problem / Index calculus algorithm / Discrete logarithm / XTR / Elliptic curve cryptography / Abstract algebra / Cryptography / Mathematics

The Past, evolving Present and Future of Discrete Logarithm Antoine Joux, Andrew Odlyzko and Cécile Pierrot Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange algorithm,

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2014-06-04 21:00:21
58Diffie–Hellman key exchange / Station-to-Station protocol / Diffie–Hellman problem / Key-agreement protocol / XTR / Advantage / Random self-reducibility / Public-key cryptography / Oracle machine / Cryptography / Cryptographic protocols / MQV

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
59Finite fields / Cryptographic protocols / Diffie–Hellman problem / Hellman / XTR / CDH / Diffie–Hellman key exchange / Whitfield Diffie / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:48:24
60Finite fields / Cryptographic protocols / Diffie–Hellman problem / Trapdoor function / Hellman / XTR / CDH / Diffie–Hellman key exchange / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:35:28
UPDATE