{"title":"关于使用实二次域的密钥交换协议","authors":"A. Azizi, Jamal Benamara, M. C. Ismaili","doi":"10.52846/ami.v48i1.1331","DOIUrl":null,"url":null,"abstract":"To prevent an exhaustive key-search attack of the key-exchange protocol using real quadratic fields, we need to ensure that the number l of reduced principal ideals in K is sufficiently large. In this paper we present an example of a family which are not valid for this protocol.","PeriodicalId":43654,"journal":{"name":"Annals of the University of Craiova-Mathematics and Computer Science Series","volume":"125 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the key-exchange protocol using real quadratic fields\",\"authors\":\"A. Azizi, Jamal Benamara, M. C. Ismaili\",\"doi\":\"10.52846/ami.v48i1.1331\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To prevent an exhaustive key-search attack of the key-exchange protocol using real quadratic fields, we need to ensure that the number l of reduced principal ideals in K is sufficiently large. In this paper we present an example of a family which are not valid for this protocol.\",\"PeriodicalId\":43654,\"journal\":{\"name\":\"Annals of the University of Craiova-Mathematics and Computer Science Series\",\"volume\":\"125 1\",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2021-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Annals of the University of Craiova-Mathematics and Computer Science Series\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52846/ami.v48i1.1331\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"MATHEMATICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annals of the University of Craiova-Mathematics and Computer Science Series","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52846/ami.v48i1.1331","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS","Score":null,"Total":0}
On the key-exchange protocol using real quadratic fields
To prevent an exhaustive key-search attack of the key-exchange protocol using real quadratic fields, we need to ensure that the number l of reduced principal ideals in K is sufficiently large. In this paper we present an example of a family which are not valid for this protocol.