The Security of all RSA and Discrete Log Bits
Johan HåstadMats NäslundPublished in: Electron. Colloquium Comput. Complex. (1999)
Keyphrases
- digital signature scheme
- key exchange
- elliptic curve cryptography
- public key cryptography
- private key
- public key
- cryptographic algorithms
- security requirements
- information security
- security systems
- access control
- elliptic curve
- security analysis
- signature scheme
- security mechanisms
- security properties
- security policies
- computer security
- modular exponentiation
- security protocols
- network security
- standard model
- public key cryptosystems
- diffie hellman
- discrete geometry
- authentication scheme
- digital signature
- neural network
- data integrity
- statistical databases
- image quality
- low cost