Security of all RSA and Discrete Log Bits.
Johan HåstadMats NäslundPublished in: IACR Cryptol. ePrint Arch. (1999)
Keyphrases
- digital signature scheme
- elliptic curve cryptography
- key exchange
- private key
- public key cryptography
- access control
- security analysis
- public key
- intrusion detection
- security requirements
- cryptographic algorithms
- information security
- security policies
- elliptic curve
- security systems
- information systems
- security properties
- discrete space
- signature scheme
- network security
- high security
- computer security
- public key cryptosystems
- security model
- continuous variables
- cyber security
- security protocols
- security services
- error correction
- anomaly detection
- security issues