Cryptanalysis of Exhaustive Search on Attacking RSA.
Mu-En WuRaylin TsoHung-Min SunPublished in: NSS (2012)
Keyphrases
- exhaustive search
- signature scheme
- public key
- secret key
- dynamic programming
- brute force
- standard model
- solution space
- computational complexity
- search methods
- digital signature scheme
- simulated annealing
- computationally feasible
- nearest neighbor search
- search space
- scatter search
- lower bound
- neural network
- elliptic curve
- modular exponentiation
- digital signature
- hash functions
- private key
- key exchange
- special case
- security analysis
- block cipher
- elliptic curve cryptography
- public key cryptosystems
- search algorithm
- metaheuristic
- evolutionary algorithm
- np hard
- linear programming