Back to Results
First PageMeta Content
Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation


1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa
Add to Reading List

Document Date: 2004-12-05 23:21:27


Open Document

File Size: 118,62 KB

Share Result on Facebook