Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring.
Jean-Sébastien CoronAlexander MayPublished in: J. Cryptol. (2007)
Keyphrases
- secret key
- public key
- signature scheme
- private key
- smart card
- authentication scheme
- secure communication
- pseudorandom
- security analysis
- diffie hellman
- key distribution
- digital signature
- key management
- encryption scheme
- key exchange
- authentication protocol
- deterministic domains
- hash functions
- public key cryptography
- stream cipher
- lightweight
- security model
- elliptic curve
- block cipher
- modular exponentiation