完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHe, WHen_US
dc.contributor.authorWu, TCen_US
dc.contributor.authorLin, CYen_US
dc.date.accessioned2014-12-08T15:42:44Z-
dc.date.available2014-12-08T15:42:44Z-
dc.date.issued2002-03-01en_US
dc.identifier.issn1016-2364en_US
dc.identifier.urihttp://hdl.handle.net/11536/28972-
dc.description.abstractThe authors give a counterexample to show that the RSA-based cryptosystem with low exponent proposed by Lee and Chang (Computer Communications 21 (1998)) is vulnerable to the low exponent attack with respect to their suggested lower boundary for the size of the public encryption key. That is, an eavesdropper can recover the plaintext from the ciphertext without knowing the secret decryption key, even though the size of the secret decryption key is large enough. The authors also suggest a new lower boundary for the size of the public encryption key for the Lee-Chang cryptosystem to enforce secrecy.en_US
dc.language.isoen_USen_US
dc.subjectRSAen_US
dc.subjectpublic key systemen_US
dc.subjectlow exponent attacken_US
dc.subjectencryption keyen_US
dc.subjectlower boundaryen_US
dc.titleRemarks on using RSA with low exponent in a public networken_US
dc.typeArticleen_US
dc.identifier.journalJOURNAL OF INFORMATION SCIENCE AND ENGINEERINGen_US
dc.citation.volume18en_US
dc.citation.issue2en_US
dc.citation.spage341en_US
dc.citation.epage344en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:000175565100010-
dc.citation.woscount0-
顯示於類別:期刊論文


文件中的檔案:

  1. 000175565100010.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。