Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,924,977 papers from all fields of science
Search
Sign In
Create Free Account
Logjam (computer security)
Known as:
CVE-2015-4000
, Logjam attack
Logjam is a security vulnerability against a Diffie–Hellman key exchange ranging from 512-bit (US export-grade) to 1024-bit keys. It was discovered…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
CRIME
Diffie–Hellman key exchange
Discrete logarithm
Export of cryptography
Expand
Broader (1)
Transport Layer Security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve
Yuqing Zhu
,
Jincheng Zhuang
,
Chang Lv
,
D. Lin
2016
Corpus ID: 13950155
The hardness of discrete logarithm problem over finite fields is the foundation of many cryptographic protocols. When the…
Expand
2016
2016
IJMĀʿ JURISPRUDENCE UNDERGOING A ‘CHEMICAL REACTION’ IN EGYPT?
Dawood Adesola Hamzah
TAFHIM: IKIM Journal of Islam and the…
2016
Corpus ID: 157553581
As sovereignty underscores governance in human society, Hakimiyyah serves as a platform to argue that Islam is both state and…
Expand
2016
2016
The problem of popular primes: Logjam
Wouter Bokslag
arXiv.org
2016
Corpus ID: 1837037
This paper will discuss the Logjam attack on TLS. The Logjam attack allows, under certain conditions, to defeat the security…
Expand
Review
2013
Review
2013
Factors affecting pricing of loanable funds by commercial banks in Kenya
J. Matete
2013
Corpus ID: 53326190
Pricing of loanable funds without a proper rationale or framework leads to uncertainty and unpredictability on the incidence of…
Expand
2011
2011
D ESIGN AND S IMULATION OF AN I NTELLIGENT T RAFFIC C ONTROL S YSTEM
Osigwe Uchenna Chinyere
,
Oladipo Onaolapo Francisca
2011
Corpus ID: 212453110
This paper described our research experiences of building an intelligent system to monitor and control road traffic in a Nigerian…
Expand
Review
2008
Review
2008
From Alienation to Revolution : A Defense of Marx ’ s Theory of Alienation
A. Steiner
2008
Corpus ID: 45424963
The following discussion presents an overview of Marx’s theory of alienation. In contrast to the usual presentation of the…
Expand
2007
2007
Persistent Pseudo-Clearance Problem in IEEE802.11 Mesh Networks and its Multicast Based Solutions
Jian Zhang
,
Y. Chen
,
I. Marsic
IEEE Workshop on Local and Metropolitan Area…
2007
Corpus ID: 9084981
Wireless mesh networks are flexible solutions to extend services from wireless LANs. The current IEEE 802.11 Specification…
Expand
Review
2004
Review
2004
Editorial: Cesarean delivery (Part 2): Managing the logjam
C. Lockwood
,
Mhcm
2004
Corpus ID: 79632630
Last month, I reviewed the factors that have driven the dramatic increase in cesarean delivery (CD) rates over the past several…
Expand
2002
2002
Oil and Violence in Sudan
J. Switzer
2002
Corpus ID: 9061507
What can be done to resolve the seemingly endless conflict in Sudan ? A nation of 36 million people, wracked by conflict for 34…
Expand
1998
1998
IMPEACHMENT LOGJAM SLOWS FLOW OF AVIATION LEGISLATION
J. Pope
1998
Corpus ID: 108263802
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE