Back to Results
First PageMeta Content
Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management


J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes
Add to Reading List

Document Date: 2011-07-09 03:55:16


Open Document

File Size: 145,44 KB

Share Result on Facebook

City

Mendham / /

Company

Key Sizes Arjen K. Lenstra Citibank N.A. / GF / Classical Asymmetric Systems Classical Asymmetric Systems / /

Country

United States / Netherlands / /

Currency

USD / /

/

Event

Extinction / /

IndustryTerm

important tools / opto-electronic sieving device / hardware factoring device / factorization algorithms / bandwidth network / generic software implementations / cryptographic protocols / expected computing power / cryptographic systems / asymmetric systems / faster general-purpose processors / cryptographic products / hardware devices / expected search time / software exhaustive key search / molecular computing / Online publication / e - commerce / Internet-accessible PC / computing / exhaustive key search / Software data points / curve systems / accessible computer systems / software attack / exhaustive search / Internet search / e-commerce enabling solutions / multiplicative / coupled network / logarithm systems / exhaustive search amounts / /

Organization

Coordinating Committee for Multilateral Export Controls / International Association for Cryptologic Research Selecting Cryptographic Key Sizes Arjen K. Lenstra Citibank / /

Person

Andrew Odlyzko / John Pollard / Eric R. Verheul / /

Position

General / /

ProvinceOrState

Manitoba / New Jersey / /

SportsLeague

International Association / /

Technology

encryption / E. R. Verheul protocol / cryptography / Public key / Data Encryption / underlying factorization algorithms / private key / secret key / DES block encryption / /

SocialTag