Login / Signup
Common modulus attacks on small private exponent RSA and some fast variants (in practice).
M. Jason Hinek
Charles C. Y. Lam
Published in:
J. Math. Cryptol. (2010)
Keyphrases
</>
cryptographic algorithms
real world
small number
privacy preserving
countermeasures
correlation coefficient
watermarking scheme
security protocols
private data
security threats