Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Lei
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao