This preview has intentionally blurred sections. Sign up to view the full version.
View Full Document Fall '04
 Jarecki
 Cryptography, Discrete logarithm, discrete logarithm assumption, discrete logarithm problem, Stinson, schnorr signature scheme

Click to edit the document details