OWHFOne-Way Hash Function (cryptography)
Copyright 1988-2018 AcronymFinder.com, All rights reserved.
References in periodicals archive ?
Security of [A.sub.i] and [PW.sub.i] is protected under the ECDLP and the OWHF assumption as discussed above.
Any adversary who eavesdrops on the communication channel and wants to recover the identity of the user [U.sub.i] faces the intractability of the OWHF assumption.
It is hard for any adversary to derive the user password [pw.sub.i] or server private key [x.sub.s] from recorded messages, because the adversary will face the OWHF assumption and the ECDLP.