scientific article
From MaRDI portal
Publication:3775466
zbMath0635.94008MaRDI QIDQ3775466
Publication date: 1986
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (18)
An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics ⋮ Attacks on Shamir's `RSA for paranoids' ⋮ Circuits constructed with MOD\(_ q\) gates cannot compute ``and in sublinear size ⋮ Batch RSA ⋮ Factoring RSA Moduli with Weak Prime Factors ⋮ Small secret exponent attack on RSA variant with modulus \(N=p^rq\) ⋮ Continued fractions applied to a family of RSA-like cryptosystems ⋮ Further cryptanalysis of a type of RSA variants ⋮ Large decryption exponents in RSA ⋮ Cryptanalysis of the RSA variant based on cubic Pell equation ⋮ Which new RSA-signatures can be computed from certain given RSA- signatures! ⋮ Cryptanalysis of a homomorphic encryption scheme ⋮ Cryptanalysis of Liaw's broadcasting cryptosystem ⋮ An implementation for a fast public-key cryptosystem ⋮ Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? ⋮ How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. ⋮ On the security of some variants of the RSA signature scheme ⋮ Elliptic curve cryptosystems and their implementation
This page was built for publication: