Skip to search formSkip to main contentSkip to account menu

Logjam (computer security)

Known as: CVE-2015-4000, Logjam attack 
Logjam is a security vulnerability against a Diffie–Hellman key exchange ranging from 512-bit (US export-grade) to 1024-bit keys. It was discovered… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The hardness of discrete logarithm problem over finite fields is the foundation of many cryptographic protocols. When the… 
2016
2016
As sovereignty underscores governance in human society, Hakimiyyah serves as a platform to argue that Islam is both state and… 
2016
2016
This paper will discuss the Logjam attack on TLS. The Logjam attack allows, under certain conditions, to defeat the security… 
Review
2013
Review
2013
Pricing of loanable funds without a proper rationale or framework leads to uncertainty and unpredictability on the incidence of… 
2011
2011
This paper described our research experiences of building an intelligent system to monitor and control road traffic in a Nigerian… 
Review
2008
Review
2008
The following discussion presents an overview of Marx’s theory of alienation. In contrast to the usual presentation of the… 
2007
2007
Wireless mesh networks are flexible solutions to extend services from wireless LANs. The current IEEE 802.11 Specification… 
Review
2004
Review
2004
Last month, I reviewed the factors that have driven the dramatic increase in cesarean delivery (CD) rates over the past several… 
2002
2002
What can be done to resolve the seemingly endless conflict in Sudan ? A nation of 36 million people, wracked by conflict for 34…