-
21“..., whose security is based on the hardness assumption of Bilinear Diffie-Hellman problem and factoring...”
Get full text
Article -
22“... on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence...”
Get full text
Article -
23“... decisional Diffie-Hellman problem assumption and hash function assumption. We will show that the proposed...”
Get full text
Article -
24“...-Hellman problem is hard, and we give a comparison of the proposed scheme with He et al.’s scheme in terms...”
Get full text
Article -
25“... problem and Diffie–Hellman problem. Moreover, asymmetric key algorithms are used in the Internet...”
Get full text
Article -
26“... assuming the hardness of the bilinear inverse Diffie–Hellman problem (BIDHP). In particular, our scheme...”
Get full text
Article -
27by Sergey V. Grebnev“... model is deduced, provided that the gap decision Diffie-Hellman problem, connected to the discrete...”
Published 2019-06-01
Get full text
Article -
28“... generator g and oracle access to a “Diffie-Hellman Problem solver” for g, it is possible to compute g1/x ∈ G...”
Get full text
Article -
29“... Diffie-Hellman) problem to improve security primarily. The security of the proposed protocol is verified...”
Get full text
Article -
30by Jingwei Liu, Qingqing Li, Huijuan Cao, Rong Sun, Xiaojiang Du, Mohsen Guizani“... assuming the intractability of the computational Diffie-Hellman problem. In consideration of the network...”
Published 2018-01-01
Get full text
Article -
31by Zuowen Tan“... authentication mechanisms have been proposed. However, since the Diffie–Hellman problem of the Chebyshev...”
Published 2021-01-01
Get full text
Article -
32“... resist forgery attack under the assumption that the Diffie-Hellman problem is hard. Furthermore, we...”
Get full text
Article -
33by Yousheng Zhou, Xiaofeng Zhao, Yi Jiang, Fengjun Shang, Shaojiang Deng, Xiaojun Wang“... the random oracle model based on the assumption of the computational Diffie–Hellman problem....”
Published 2017-12-01
Get full text
Article -
34“... based service. We use the timestamp mechanism and rely on CDH (Computational Diffie-Hellman) problem...”
Get full text
Article -
35by Jian‐Neng Chen, Zhen‐Jie Huang, Yu‐Ping Zhou, Fu‐Min Zou, Chien‐Ming Chen, Jimmy Ming‐Tai Wu, Tsu‐Yang Wu“... forgery attack in the random oracle model and under the computational Diffie–Hellman problem...”
Published 2020-11-01
Get full text
Article -
36A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application“... are correct. The protocol is proven secure under the inverse computational Diffie-Hellman problem assumption...”
Get full text
Article -
37“... the random oracle model with the difficulties of decision Diffie-Hellman problem and against the adversaries...”
Get full text
Article -
38by Cash, Charles David“..., which we summarize below. The Twin Diffie-Hellman Problem. We describe techniques for analyzing...”
Published 2010
Get full text
-
39“... in the Random Oracle Model assuming the computational Diffie-Hellman problem is intractable. Furthermore...”
Get full text
Article -
40“... against adaptive chosen ciphertext attack under the computational Diffie-Hellman problem...”
Get full text
Article