Mathematical Background of Public Key Cryptography

Gerhard Frey, Tanja Lange

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.
    Original languageEnglish
    Title of host publicationSeminaires et congres
    Volume11
    Publication date2005
    Pages41-73
    ISBN (Print)2-85629-175-9
    Publication statusPublished - 2005

    Fingerprint

    Dive into the research topics of 'Mathematical Background of Public Key Cryptography'. Together they form a unique fingerprint.

    Cite this