Abstract:
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we discuss the post-quantum Di...Show MoreMetadata
Abstract:
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols
Published in: 2006 IEEE Information Assurance Workshop
Date of Conference: 21-23 June 2006
Date Added to IEEE Xplore: 10 July 2006
Print ISBN:1-4244-0130-5