Skip to main content
Top

Applicable Algebra in Engineering, Communication and Computing

Issue 6/2006

Content (6 Articles)

Mathematical Techniques in Cryptology—Editorial

Thomas Beth, Willi Geiselmann, Rainer Steinwandt

On the bit security of the Diffie-Hellman key

Ian F. Blake, Theo Garefalakis, Igor E. Shparlinski

Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model

Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto

Premium Partner