Login / Signup
Simple Backdoors on RSA Modulus by Using RSA Vulnerability.
Hung-Min Sun
Mu-En Wu
Cheng-Ta Yang
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2009)
Keyphrases
</>
public key
modular exponentiation
key exchange
signature scheme
np complete
highly reliable
satisfiability problem
information systems
artificial intelligence
case study
real time
decision making
elliptic curve
genetic algorithm
databases
public key cryptography
data sets