Stronger Security Proofs for RSA and Rabin Bits.
Roger FischlinClaus-Peter SchnorrPublished in: J. Cryptol. (2000)
Keyphrases
- digital signature scheme
- key exchange
- elliptic curve cryptography
- public key cryptography
- private key
- network security
- cryptographic algorithms
- intrusion detection
- public key
- elliptic curve
- information security
- statistical databases
- access control
- security model
- security protocols
- security policies
- cyber security
- diffie hellman
- security analysis
- security requirements
- modular exponentiation
- signature scheme
- public key cryptosystems
- information systems