On the security of the Merkle- Hellman cryptographic scheme (Corresp.).
Adi ShamirRichard ZippelPublished in: IEEE Trans. Inf. Theory (1980)
Keyphrases
- key management
- elliptic curve cryptography
- secure communication
- public key encryption
- security properties
- key management scheme
- authentication scheme
- security analysis
- smart card
- encryption scheme
- encryption key
- security protocols
- public key cryptography
- diffie hellman
- provably secure
- key agreement
- information security
- elliptic curve
- public key cryptosystem
- random number generator
- stream cipher
- identity based cryptography
- cca secure
- hash functions
- key distribution
- digital signature scheme
- high security
- security issues
- cryptographic protocols
- protection schemes
- secret sharing scheme
- security mechanisms
- high assurance
- encryption decryption
- cryptographic algorithms
- security model
- network security
- protection scheme
- key agreement protocol
- standard model
- security systems
- digital signature
- authentication mechanism
- security requirements
- authentication protocol
- intrusion detection
- data sharing
- security level