Login / Signup
Basing Weak Public-Key Cryptography on Strong One-Way Functions.
Eli Biham
Yaron J. Goren
Yuval Ishai
Published in:
TCC (2008)
Keyphrases
</>
public key cryptography
public key
elliptic curve
security model
digital signature
authentication and key agreement
database
search engine
digital libraries
digital content
provably secure
elliptic curve cryptography