simultaneous conjugacy search problem / authentication protocol / public key encryption protocols / heuristic algorithm / chosen power product / et al. protocol / type encryption protocol / type protocols / proof-systems / et al. public key encryption protocols / free abelian / search problem / random power products / power products / hard conjugacy search problem / conjugacy search problem / authentication protocols / certain heuristic algorithm / et al. protocols / power product / beta protocol / random power product / /
Organization
National Science Foundation / /
Person
Bob / Alice / /
Position
candidate for having generically hard conjugacy search problem / general CSP / Private / second author / /
Product
Diffie-Hellman / t10 / Wang / Section / Z11 / /
Technology
encryption / heuristic algorithm / cryptography / et al. protocol / two ElGamal-type public key encryption protocols / Feige-FiatShamir type protocols / GrigorievShpilrain authentication protocol / Wang et al. protocol / public key / DiffieHellman protocol / two authentication protocols / Wang et al. protocols / Grigoriev-Shpilrain authentication protocol / Grigoriev-Shpilrain protocol / I. All Wang et al. protocols / Wang et al. public key encryption protocols / following protocol / private key / two protocols / beta protocol / using Algorithm / N. GrigorievShpilrain authentication protocol / Diffie-Hellman type encryption protocol / certain heuristic algorithm / /