On the bit security of the weak Diffie-Hellman problem.
Dongyoung RohSang Geun HahnPublished in: Inf. Process. Lett. (2010)
Keyphrases
- diffie hellman
- security properties
- key exchange protocol
- key exchange
- key agreement protocol
- public key cryptosystem
- public key
- standard model
- encryption scheme
- password based authenticated key exchange
- elliptic curve
- key agreement
- secure communication
- group communication
- key management
- secret key
- private key
- signature scheme
- ciphertext
- security analysis
- key distribution
- formal model
- security requirements
- provably secure
- intrusion detection
- digital signature
- security model
- security protocols
- resource constrained