|
Volumn 5350 LNCS, Issue , 2008, Pages 344-354
|
On the validity of the Φ-Hiding assumption in cryptographic protocols
|
Author keywords
Hiding assumption; Euler's totient function; Jacobi symbol
|
Indexed keywords
COMPUTATIONAL COMPLEXITY;
FUNCTIONS;
PROBABILITY DENSITY FUNCTION;
CRYPTOGRAPHIC PROTOCOLS;
EULER'S TOTIENT FUNCTION;
JACOBI SYMBOL;
MATHEMATICAL PROBLEMS;
TIME ALGORITHMS;
CRYPTOGRAPHY;
|
EID: 58349096579
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/978-3-540-89255-7_21 Document Type: Conference Paper |
Times cited : (13)
|
References (8)
|