{"_id":"C8u6AETZoFXzeDGo5","bibbaseid":"barak-mahmoodyghidary-merklepuzzlesareoptimalanon2attackonkeyexchangefromarandomoracle-2009","authorIDs":["wCjtR5GbDRHRPyuzr"],"author_short":["Barak, B.","Mahmoody-Ghidary, M."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Boaz"],"propositions":[],"lastnames":["Barak"],"suffixes":[]},{"firstnames":["Mohammad"],"propositions":[],"lastnames":["Mahmoody-Ghidary"],"suffixes":[]}],"title":"Merkle Puzzles are Optimal — an $O(n^2)$ attack on key exchange from a random oracle","year":"2009","booktitle":"Proceedings of CRYPTO '09","url_paper":"https://www.boazbarak.org/Papers/merkle.pdf","bibtex":"@INProceedings{BarakGh09,\n AUTHOR = {Boaz Barak and Mohammad Mahmoody-Ghidary},\n TITLE = {Merkle Puzzles are Optimal --- an $O(n^2)$ attack on key exchange from a random oracle},\n year = {2009},\n BOOKTITLE = {Proceedings of CRYPTO '09},\n url_paper = {https://www.boazbarak.org/Papers/merkle.pdf},\n}\n\n","author_short":["Barak, B.","Mahmoody-Ghidary, M."],"key":"BarakGh09","id":"BarakGh09","bibbaseid":"barak-mahmoodyghidary-merklepuzzlesareoptimalanon2attackonkeyexchangefromarandomoracle-2009","role":"author","urls":{" paper":"https://www.boazbarak.org/Papers/merkle.pdf"},"metadata":{"authorlinks":{"barak, b":"https://www.boazbarak.org/papers/"}},"downloads":5},"bibtype":"inproceedings","biburl":"www.boazbarak.org/boaz.bib","creationDate":"2020-12-14T09:07:39.358Z","downloads":5,"keywords":[],"search_terms":["merkle","puzzles","optimal","attack","key","exchange","random","oracle","barak","mahmoody-ghidary"],"title":"Merkle Puzzles are Optimal — an $O(n^2)$ attack on key exchange from a random oracle","year":2009,"dataSources":["ZdZkvHBZGR7Mt6sXE","jomRn3LFHawZsjFia","rRM8G92fpDDvXxQen"]}