Cryptography Reference
In-Depth Information
on solving discrete logarithms and, as we shall see, there are other cryptographic
systems that also rely on the hardness of the discrete logarithm problem for their
security. Therefore, an evaluation of the hardness of this problem taking into account
the algorithms and the computations mentioned in Chap. 6 is necessary to establish
parameters which provide reasonable security when implementing these systems.
Search WWH ::




Custom Search