Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring.
Jean-Sébastien CoronAlexander MayPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- secret key
- public key
- signature scheme
- private key
- smart card
- diffie hellman
- authentication scheme
- secure communication
- security analysis
- pseudorandom
- public key cryptography
- key distribution
- key management
- key exchange
- encryption scheme
- digital signature
- security model
- modular exponentiation
- security level
- stream cipher
- hash functions
- real time
- deterministic domains
- authentication protocol
- data sets