Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Shin-Jia HwangChin-Chen ChangWei-Pang YangPublished in: Cryptography: Policy and Algorithms (1995)
Keyphrases
- authenticated key agreement
- modular exponentiation
- key agreement protocol
- public key cryptosystems
- secure communication
- private information retrieval
- security protocols
- key exchange
- cryptographic protocols
- addition chains
- diffie hellman
- authentication protocol
- secret key
- secret sharing
- elliptic curve
- security analysis
- standard model
- digital signal processing
- peer to peer
- client server
- wireless networks