On the fog of RSA key lengths: Verifying public key cryptography strength recommendations.
Mikko KiviharjuPublished in: ICMCIS (2017)
Keyphrases
- public key cryptography
- public key
- private key
- elliptic curve
- elliptic curve cryptography
- authentication and key agreement
- modular exponentiation
- digital signature
- secure communication
- security model
- provably secure
- security analysis
- high security
- public key infrastructure
- security services
- signature scheme
- recommender systems
- diffie hellman
- key management
- authentication scheme
- authentication protocol
- data integrity
- secret key
- similarity measure