Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles. Barak, B. & Mahmoody-Ghidary, M. J. Cryptol., 30(3):699-734, 2017.
Link
Paper bibtex @article{journals/joc/BarakM17,
added-at = {2020-09-18T00:00:00.000+0200},
author = {Barak, Boaz and Mahmoody-Ghidary, Mohammad},
biburl = {https://www.bibsonomy.org/bibtex/27f29e7fbe6de03f5e0182644b22b8879/dblp},
ee = {https://doi.org/10.1007/s00145-016-9233-9},
interhash = {697fe904459f8f425dbacd30aa39f46f},
intrahash = {7f29e7fbe6de03f5e0182644b22b8879},
journal = {J. Cryptol.},
keywords = {dblp},
number = 3,
pages = {699-734},
timestamp = {2020-09-19T11:42:05.000+0200},
title = {Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles.},
url = {http://dblp.uni-trier.de/db/journals/joc/joc30.html#BarakM17},
volume = 30,
year = 2017
}
Downloads: 0
{"_id":"Mimgng8TLoxBAYheL","bibbaseid":"barak-mahmoodyghidary-merkleskeyagreementprotocolisoptimalanon2attackonanykeyagreementfromrandomoracles-2017","author_short":["Barak, B.","Mahmoody-Ghidary, M."],"bibdata":{"bibtype":"article","type":"article","added-at":"2020-09-18T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Barak"],"firstnames":["Boaz"],"suffixes":[]},{"propositions":[],"lastnames":["Mahmoody-Ghidary"],"firstnames":["Mohammad"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/27f29e7fbe6de03f5e0182644b22b8879/dblp","ee":"https://doi.org/10.1007/s00145-016-9233-9","interhash":"697fe904459f8f425dbacd30aa39f46f","intrahash":"7f29e7fbe6de03f5e0182644b22b8879","journal":"J. Cryptol.","keywords":"dblp","number":"3","pages":"699-734","timestamp":"2020-09-19T11:42:05.000+0200","title":"Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles.","url":"http://dblp.uni-trier.de/db/journals/joc/joc30.html#BarakM17","volume":"30","year":"2017","bibtex":"@article{journals/joc/BarakM17,\n added-at = {2020-09-18T00:00:00.000+0200},\n author = {Barak, Boaz and Mahmoody-Ghidary, Mohammad},\n biburl = {https://www.bibsonomy.org/bibtex/27f29e7fbe6de03f5e0182644b22b8879/dblp},\n ee = {https://doi.org/10.1007/s00145-016-9233-9},\n interhash = {697fe904459f8f425dbacd30aa39f46f},\n intrahash = {7f29e7fbe6de03f5e0182644b22b8879},\n journal = {J. Cryptol.},\n keywords = {dblp},\n number = 3,\n pages = {699-734},\n timestamp = {2020-09-19T11:42:05.000+0200},\n title = {Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles.},\n url = {http://dblp.uni-trier.de/db/journals/joc/joc30.html#BarakM17},\n volume = 30,\n year = 2017\n}\n\n","author_short":["Barak, B.","Mahmoody-Ghidary, M."],"key":"journals/joc/BarakM17","id":"journals/joc/BarakM17","bibbaseid":"barak-mahmoodyghidary-merkleskeyagreementprotocolisoptimalanon2attackonanykeyagreementfromrandomoracles-2017","role":"author","urls":{"Link":"https://doi.org/10.1007/s00145-016-9233-9","Paper":"http://dblp.uni-trier.de/db/journals/joc/joc30.html#BarakM17"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/barak ?items=1000","dataSources":["sNDcqxpX5cBQ5Pu7G"],"keywords":["dblp"],"search_terms":["merkle","key","agreement","protocol","optimal","attack","key","agreement","random","oracles","barak","mahmoody-ghidary"],"title":"Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles.","year":2017}