Mathematical Background of Public Key Cryptography

Gerhard Frey, Tanja Lange

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.
    Original languageEnglish
    Title of host publicationSeminaires et congres
    Publication date2005
    ISBN (Print)2-85629-175-9
    Publication statusPublished - 2005


    Dive into the research topics of 'Mathematical Background of Public Key Cryptography'. Together they form a unique fingerprint.

    Cite this