Login / Signup

Why You Cannot Even Hope to use Gröbner Bases in Public Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge to Those Who Have Not Yet Failed.

Boo BarkeeDeh Cac CanJulia EcksTheo MoriartyR. F. Ree
Published in: J. Symb. Comput. (1994)
Keyphrases
  • public key cryptography
  • public key
  • numerically stable
  • multiscale
  • security model
  • social networking
  • elliptic curve
  • authentication and key agreement