[Download postscript version]
next up previous contents
Next: The Diffie-Hellman key exchange Up: Introduction to Cryptography Previous: Primitive roots

Encryption based on powers and congruences

 



Adrian Perrig
Fri May 31 09:07:38 MET DST 1996