Received: 2012-05-14
Revised: 2013-04-14
Accepted: 2013-09-29
Published Online: 2013-11-09
Published in Print: 2014-02-01
© 2014 by Walter de Gruyter Berlin/Boston
Articles in the same Issue
- Frontmatter
- Constructing elliptic curve isogenies in quantum subexponential time
- Persistent asymmetric password-based key exchange
- Collision bounds for the additive Pollard rho algorithm for solving discrete logarithms
- Erratum Self-pairings on hyperelliptic curves [J. Math. Cryptol. 7 (2013), 31–42]
Keywords for this article
Cryptographic protocol;
password-based key exchange;
provable security;
projective hash function;
dictionary attack
Creative Commons
BY-NC-ND 3.0
Articles in the same Issue
- Frontmatter
- Constructing elliptic curve isogenies in quantum subexponential time
- Persistent asymmetric password-based key exchange
- Collision bounds for the additive Pollard rho algorithm for solving discrete logarithms
- Erratum Self-pairings on hyperelliptic curves [J. Math. Cryptol. 7 (2013), 31–42]