2021
DOI: 10.1016/j.eswa.2020.114047
|View full text |Cite
|
Sign up to set email alerts
|

An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…For instance, if the message is 200-bit integer and the public exponent is 3, then the available public message will be a 600bit integer. This means the message can be recovered using a non-modular cube root, which is simple and easy to compute [18]. Furthermore, for chosen-ciphertext (CCA) security, a variation of the Cramer-Shoup (CS) method [19] makes use of the computational Diffie-Hellman (CDH) assumption.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, if the message is 200-bit integer and the public exponent is 3, then the available public message will be a 600bit integer. This means the message can be recovered using a non-modular cube root, which is simple and easy to compute [18]. Furthermore, for chosen-ciphertext (CCA) security, a variation of the Cramer-Shoup (CS) method [19] makes use of the computational Diffie-Hellman (CDH) assumption.…”
Section: Introductionmentioning
confidence: 99%