The security of all RSA and discrete log bits
From MaRDI portal
Publication:5501189
DOI10.1145/972639.972642zbMath1317.94111OpenAlexW2115652664WikidataQ56958944 ScholiaQ56958944MaRDI QIDQ5501189
Publication date: 1 August 2015
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/972639.972642
Related Items (6)
The security of all private-key bits in isogeny-based schemes ⋮ Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate Polynomials ⋮ On the power generator and its multivariate analogue ⋮ Using LLL-Reduction for Solving RSA and Factorization Problems ⋮ Anonymous protocols: notions and equivalence ⋮ Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
This page was built for publication: The security of all RSA and discrete log bits