Publication | Closed Access
Merkle’s Key Agreement Protocol is Optimal: An $$O(n^2)$$ O ( n 2 ) Attack on Any Key Agreement from Random Oracles
14
Citations
13
References
2016
Year
Secure Multi-party ComputationCryptographic PrimitiveEngineeringInformation SecurityRandom OraclesKey Agreement ProtocolN 2Computer ScienceCryptographic ProtocolSecure ProtocolAuthentication ProtocolData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1