Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Strong RSA assumption
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==References== * BariΔ N., Pfitzmann B. (1997) Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. In: Fumy W. (eds) Advances in Cryptology β EUROCRYPT β97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. {{doi|10.1007/3-540-69053-0_33}} * Fujisaki E., Okamoto T. (1997) Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski B.S. (eds) Advances in Cryptology β CRYPTO '97. CRYPTO 1997. Lecture Notes in Computer Science, vol 1294. Springer, Berlin, Heidelberg. {{doi|10.1007/BFb0052225}} * [[Ronald Cramer]] and [[Victor Shoup]]. 1999. Signature schemes based on the strong RSA assumption. In ''Proceedings of the 6th ACM conference on Computer and communications security'' (''CCS β99''). Association for Computing Machinery, New York, NY, USA, 46β51. {{doi|10.1145/319709.319716}} * [[Ronald L. Rivest]] and [[Burt Kaliski]]. 2003. ''RSA Problem''. [http://theory.lcs.mit.edu/~rivest/RivestKaliski-RSAProblem.pdf pdf file] {{Cryptography navbox | public-key}} {{Computational hardness assumptions}} [[Category:Computational hardness assumptions]] {{crypto-stub}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)