Back to Results
First PageMeta Content
Electronic commerce / Key management / RSA / Integer factorization / Digital signature / Key size / Strong RSA assumption / Elliptic curve cryptography / Random oracle / Cryptography / Public-key cryptography / Computational hardness assumptions


Evaluation of Security Level of Cryptography: ACE Signature Scheme Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang
Add to Reading List

Document Date: 2013-06-03 22:32:58


Open Document

File Size: 66,19 KB

Share Result on Facebook

Company

AES / CRC Press / /

/

IndustryTerm

rho algorithm / specialpurpose factoring algorithm / polynomial-time reduction algorithm / rho factoring algorithm / polynomial-time algorithm / quadratic sieve factoring algorithm / then stop processing / computing / elliptic curve factoring algorithm / /

Movie

Page 3 2 / /

Person

Alfred Menezes / S. Halevi / T. Rabin / R. Gennaro / Wang Certicom / Doug Stinson / /

Position

hb / /

Technology

encryption / quadratic sieve factoring algorithm / 1 3 toring algorithm / Cryptography / rho factoring algorithm / polynomial-time reduction algorithm / specialpurpose factoring algorithm / 1 factoring algorithm / public key / elliptic curve factoring algorithm / LLL algorithm / polynomial-time algorithm / p-1 factoring algorithm / 1 algorithm / private key / rho algorithm / 2001 2 Protocol / 2 Protocol / /

URL

http /

SocialTag