Mathematical Background of Public Key Cryptography

Gerhard Frey, Tanja Lange

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.
    Original languageEnglish
    Title of host publicationSeminaires et congres
    Publication date2005
    ISBN (Print)2-85629-175-9
    Publication statusPublished - 2005

    Cite this

    Frey, G., & Lange, T. (2005). Mathematical Background of Public Key Cryptography. In Seminaires et congres (Vol. 11, pp. 41-73)