Full metadata record
DC FieldValueLanguage
dc.contributor.authorHe, WHen_US
dc.contributor.authorWu, TCen_US
dc.contributor.authorLin, CYen_US
dc.date.accessioned2014-12-08T15:42:44Z-
dc.date.available2014-12-08T15:42:44Z-
dc.date.issued2002-03-01en_US
dc.identifier.issn1016-2364en_US
dc.identifier.urihttp://hdl.handle.net/11536/28972-
dc.description.abstractThe authors give a counterexample to show that the RSA-based cryptosystem with low exponent proposed by Lee and Chang (Computer Communications 21 (1998)) is vulnerable to the low exponent attack with respect to their suggested lower boundary for the size of the public encryption key. That is, an eavesdropper can recover the plaintext from the ciphertext without knowing the secret decryption key, even though the size of the secret decryption key is large enough. The authors also suggest a new lower boundary for the size of the public encryption key for the Lee-Chang cryptosystem to enforce secrecy.en_US
dc.language.isoen_USen_US
dc.subjectRSAen_US
dc.subjectpublic key systemen_US
dc.subjectlow exponent attacken_US
dc.subjectencryption keyen_US
dc.subjectlower boundaryen_US
dc.titleRemarks on using RSA with low exponent in a public networken_US
dc.typeArticleen_US
dc.identifier.journalJOURNAL OF INFORMATION SCIENCE AND ENGINEERINGen_US
dc.citation.volume18en_US
dc.citation.issue2en_US
dc.citation.spage341en_US
dc.citation.epage344en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:000175565100010-
dc.citation.woscount0-
Appears in Collections:Articles


Files in This Item:

  1. 000175565100010.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.