Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | He, WH | en_US |
dc.contributor.author | Wu, TC | en_US |
dc.contributor.author | Lin, CY | en_US |
dc.date.accessioned | 2014-12-08T15:42:44Z | - |
dc.date.available | 2014-12-08T15:42:44Z | - |
dc.date.issued | 2002-03-01 | en_US |
dc.identifier.issn | 1016-2364 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/28972 | - |
dc.description.abstract | The authors give a counterexample to show that the RSA-based cryptosystem with low exponent proposed by Lee and Chang (Computer Communications 21 (1998)) is vulnerable to the low exponent attack with respect to their suggested lower boundary for the size of the public encryption key. That is, an eavesdropper can recover the plaintext from the ciphertext without knowing the secret decryption key, even though the size of the secret decryption key is large enough. The authors also suggest a new lower boundary for the size of the public encryption key for the Lee-Chang cryptosystem to enforce secrecy. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | RSA | en_US |
dc.subject | public key system | en_US |
dc.subject | low exponent attack | en_US |
dc.subject | encryption key | en_US |
dc.subject | lower boundary | en_US |
dc.title | Remarks on using RSA with low exponent in a public network | en_US |
dc.type | Article | en_US |
dc.identifier.journal | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | en_US |
dc.citation.volume | 18 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 341 | en_US |
dc.citation.epage | 344 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:000175565100010 | - |
dc.citation.woscount | 0 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.