next up previous contents
Next: The Diffie-Hellman key exchange Up: Notes on Cryptography Previous: Proof of Theorem 5

Encryption techniques based on powers and congruences



 

Translated from LaTeX by Scott Sutherland
1998-03-15