RSA/Rabin Bits are 1/2 + 1/poly(log N) Secure
Werner AlexiBenny ChorOded GoldreichClaus-Peter SchnorrPublished in: FOCS (1984)
Keyphrases
- key exchange
- digital signature scheme
- private key
- public key
- digital signature
- public key cryptography
- security analysis
- cryptographic algorithms
- signature scheme
- worst case
- authentication scheme
- key management
- public key cryptosystems
- modular exponentiation
- diffie hellman
- lower bound
- elliptic curve cryptography
- secure communication
- cryptographic protocols
- block cipher
- security model
- security level
- security requirements
- key distribution
- security issues
- elliptic curve
- smart card
- standard model
- user authentication
- encryption scheme
- highly efficient
- covert channel
- security mechanisms