Back to Results
First PageMeta Content
Cyberwarfare / Mathematics / RSA / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Prime number / Blum–Goldwasser cryptosystem / Merkle–Hellman knapsack cryptosystem / Public-key cryptography / Electronic commerce / Espionage


A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT
Add to Reading List

Document Date: 1999-02-17 16:51:49


Open Document

File Size: 18,52 KB

Share Result on Facebook

City

Amsterdam / Milwaukee / /

Company

Simmons / Knuth / AT&T / /

IndustryTerm

software programs / important public key systems / elliptic curve factorization algorithm / public key network / integer factoring algorithms / /

Organization

Univ. of Wisconsin / Katholieke Universiteit Leuven / MIT / /

Person

H. W. Lenstra / Jr. / R. Tijdeman / Murray Hill / /

Product

Skullcandy G.I. Headphone/Headset / B-3030 Heverlee / /

ProgrammingLanguage

L / /

ProvinceOrState

New Jersey / Wisconsin / /

Technology

encryption / Lenstra algorithm / cryptography / integer factoring algorithms / public key / factoring algorithms / decrypting algorithm / elliptic curve factorization algorithm / /

SocialTag