Loopholes in two public key cryptosystems using the modular group

9Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We demonstrate that the public key cryptosystems using the modular group suggested in [4,5] are vulnerable to very simple ciphertextonly attacks. Consequently, in the present form both of these systems cannot be considered as sufficiently secure for cryptographic purposes.

Cite

CITATION STYLE

APA

Steinwandt, R. (2001). Loopholes in two public key cryptosystems using the modular group. In Lecture Notes in Computer Science (Vol. 1992, pp. 180–189). Springer Verlag. https://doi.org/10.1007/3-540-44586-2_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free