Login / Signup

A Key-Exchange Protocol Using Real Quadratic Fields.

Renate ScheidlerJohannes BuchmannHugh C. Williams
Published in: J. Cryptol. (1994)
Keyphrases
  • key exchange protocol
  • key exchange
  • password authentication
  • image compression
  • intrusion detection
  • fault tolerant