<--- Back to Details
First PageDocument Content
Cryptographic protocols / Electronic commerce / Computational hardness assumptions / RSA / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm / Schmidt–Samoa cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Finite fields
Date: 2003-01-05 20:38:47
Cryptographic protocols
Electronic commerce
Computational hardness assumptions
RSA
Diffie–Hellman key exchange
Diffie–Hellman problem
Discrete logarithm
Schmidt–Samoa cryptosystem
Paillier cryptosystem
Cryptography
Public-key cryptography
Finite fields

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Download Document from Source Website

File Size: 41,78 KB

Share Document on Facebook

Similar Documents

Abstract algebra / Algebra / Cryptography / Finite fields / Group theory / Logarithms / Computational hardness assumptions / Binary operations / Discrete logarithm / Elliptic curve cryptography / Prime number / Elliptic curve

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:

DocID: 1r2Hf - View Document

Abstract algebra / Algebra / Group theory / Mathematics / Logarithms / Computational hardness assumptions / Finite fields / Modular arithmetic / Index calculus algorithm / Discrete logarithm / Baby-step giant-step / Elliptic curve

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

DocID: 1qjra - View Document

Computational complexity theory / Theory of computation / Complexity classes / Approximation algorithms / Computational hardness assumptions / Polynomial-time approximation scheme / Time complexity / NC / Reduction / Exponential time hypothesis / NP-hardness / NP

Approximating the least hypervolume contributor: NP-hard in general, but fast in practice Karl Bringmann1 and Tobias Friedrich2 1

DocID: 1q2Qr - View Document

Cryptography / Integer factorization algorithms / Computational hardness assumptions / E-commerce / RSA / Quadratic sieve / Lattice / Integer factorization

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

DocID: 1pMu4 - View Document

Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

DocID: 1mJoe - View Document