First Page | Document Content | |
---|---|---|
![]() Date: 2005-12-09 05:56:33Computational hardness assumptions Diffie–Hellman key exchange Diffie–Hellman problem Weil pairing ID-based encryption Password authentication protocol Public-key cryptography Boneh/Franklin scheme Cryptography Cryptographic protocols Finite fields | Add to Reading List |