Protocol II, without using the NAXOS trick, is still secure even if the exponent of an ephemeral public key is leaked.
协议二没有采用NAXOS方法,即使用户临时公钥的离散对数泄漏,协议仍是安全的。
Protocol II, without using the NAXOS trick, is still secure even if the exponent of an ephemeral public key is leaked.
协议二没有采用NAXOS方法,即使用户临时公钥的离散对数泄漏,协议仍是安全的。
应用推荐