Relationships among the Computational Powers of Breaking Discrete Log Cryptosystems
- 1 January 1995
- book chapter
- Published by Springer Nature
- p. 341-355
- https://doi.org/10.1007/3-540-49264-x_28
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete LogarithmsPublished by Springer Nature ,2001
- Non-Interactive Oblivious Transfer and ApplicationsPublished by Springer Nature ,2001
- Cheating at Mental PokerPublished by Springer Nature ,2000
- Diffie-Hellman is as Strong as Discrete Log for Certain PrimesPublished by Springer Nature ,1990
- Limits on the provable consequences of one-way permutationsPublished by Association for Computing Machinery (ACM) ,1989
- Elliptic Curve CryptosystemsMathematics of Computation, 1987
- A Course in Number Theory and CryptographyPublished by Springer Nature ,1987
- Discrete logarithms inGF(p)Algorithmica, 1986
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- New directions in cryptographyIEEE Transactions on Information Theory, 1976