An M3 Public-Key Encryption Scheme

31Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

It is well known that the RSA public-key cryptosystem can be broken if the composite modulus can be factored. It is nor known, however, whether the problem of breaking any RSA system is equivalent in difficulty to factoring the modulus. In 1979 Rabin [5] introduced a public-key cryptosystem which is as difficult to break as it is to factor a modulus R=p1p2, where p1p2 are two distinct large primes. Esaentially Rabin suggested that the designer of such a scheme first determine p1 and p2, keep them secret and make R public. Anyone wishing to send a secure message H (0 < M < R) to the designer would encrypt M as K, where (Formula presented.) and 0 < K < R, then transmit K to the designer.

References Powered by Scopus

217Citations
56Readers
Get full text
14Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Williams, H. C. (1986). An M3 Public-Key Encryption Scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 218 LNCS, pp. 358–368). Springer Verlag. https://doi.org/10.1007/3-540-39799-X_26

Readers over time

‘10‘11‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘2302468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 18

55%

Professor / Associate Prof. 6

18%

Researcher 6

18%

Lecturer / Post doc 3

9%

Readers' Discipline

Tooltip

Computer Science 25

71%

Mathematics 6

17%

Physics and Astronomy 2

6%

Engineering 2

6%

Save time finding and organizing research with Mendeley

Sign up for free
0