Back to Results
First PageMeta Content
Electronic commerce / Finite fields / Key size / RSA / Key / Brute-force attack / XTR / Cryptanalysis / Quantum computer / Cryptography / Public-key cryptography / Key management


Selecting Cryptographic Key Sizes Arjen K. Lenstra1 , Eric R. Verheul2 1 Citibank, N.A., and Technische Universiteit Eindhoven, 1 North Gate Road, Mendham, NJ[removed], U.S.A.,
Add to Reading List

Document Date: 2003-06-05 07:41:02


Open Document

File Size: 293,56 KB

Share Result on Facebook

Company

Classical Asymmetric Systems Classical Asymmetric Systems / PricewaterhouseCoopers / Eric R. Verheul2 1 Citibank N.A. / /

Country

United States / Netherlands / /

Currency

USD / /

/

Event

Extinction / /

IndustryTerm

important tools / highbandwidth network / generic software implementations / cryptographic protocols / expected computing power / cryptographic systems / asymmetric systems / cryptographic products / expected search time / software exhaustive key search / molecular computing / e - commerce / Internet-accessible PC / computing / exhaustive key search / curve systems / accessible computer systems / software attack / exhaustive search / e-commerce enabling solutions / multiplicative / coupled network / logarithm systems / exhaustive search amounts / /

Organization

Coordinating Committee for Multilateral Export Controls / /

Person

John Pollard / Mike Wiener / /

Position

General / /

Technology

encryption / Cryptography / public key / Data Encryption / private key / secret key / DES block encryption / /

SocialTag