Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles. Barak, B. & Mahmoody-Ghidary, M. J. Cryptol., 30(3):699-734, 2017.
Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles. [link]Link  Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles. [link]Paper  bibtex   
@article{journals/joc/BarakM17,
  added-at = {2020-09-18T00:00:00.000+0200},
  author = {Barak, Boaz and Mahmoody-Ghidary, Mohammad},
  biburl = {https://www.bibsonomy.org/bibtex/27f29e7fbe6de03f5e0182644b22b8879/dblp},
  ee = {https://doi.org/10.1007/s00145-016-9233-9},
  interhash = {697fe904459f8f425dbacd30aa39f46f},
  intrahash = {7f29e7fbe6de03f5e0182644b22b8879},
  journal = {J. Cryptol.},
  keywords = {dblp},
  number = 3,
  pages = {699-734},
  timestamp = {2020-09-19T11:42:05.000+0200},
  title = {Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles.},
  url = {http://dblp.uni-trier.de/db/journals/joc/joc30.html#BarakM17},
  volume = 30,
  year = 2017
}

Downloads: 0