An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
- 1 January 1981
- journal article
- Published by Elsevier in Computers & Mathematics with Applications
- Vol. 7 (6) , 447-450
- https://doi.org/10.1016/0898-1221(81)90029-8
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- A modification of the RSA public-key encryption procedure (Corresp.)IEEE Transactions on Information Theory, 1980
- Cryptocomplexity and NP-completenessPublished by Springer Nature ,1980
- Symmetric and Asymmetric EncryptionACM Computing Surveys, 1979
- Cryptology in TransitionACM Computing Surveys, 1979
- How to share a secretCommunications of the ACM, 1979
- Privacy and authentication: An introduction to cryptographyProceedings of the IEEE, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978