A second major class of attack on the … We propose the use of exponential key exchange … [Diffie and Hellman, IEEE Trans. Information Theory Nov 1976] to provide … it involves the two parties exchanging numbers that … calculated, cannot easily derive the key.
Google-1
Google-2
Copyright clearance needed for quotation.