First Page | Document Content | |
---|---|---|
![]() Date: 2013-09-12 01:05:36Logarithms Computational hardness assumptions Modular arithmetic Key size Cryptanalysis Pairing-based cryptography Discrete logarithm Public-key cryptography Encryption Cryptography Abstract algebra Mathematics | Source URL: www.nict.go.jpDownload Document from Source WebsiteFile Size: 326,94 KBShare Document on Facebook |