Abstract
Abstract a computational short-cut is shown, which can compromise the security of Rabin's digital signature system.
Keywords
CompromiseComputer scienceComputer securityDigital signatureSignature (topology)MathematicsLawPolitical science
Related Publications
Digital Twins and Cyber–Physical Systems toward Smart Manufacturing and Industry 4.0: Correlation and Comparison
State-of-the-art technologies such as the Internet of Things (IoT), cloud computing (CC), big data analytics (BDA), and artificial intelligence (AI) have greatly stimulated the ...
Dynamic Capabilities at IBM: Driving Strategy into Action
In the past 15 years, the IBM Company has undergone a remarkable transformation from a struggling seller of hardware to a successful broad range solutions provider. Underlying t...
Publication Info
- Year
- 1979
- Type
- article
- Volume
- 3
- Issue
- 3
- Pages
- 187-191
- Citations
- 137
- Access
- Closed
External Links
Social Impact
Altmetric
PlumX Metrics
Social media, news, blog, policy document mentions
Citation Metrics
137
OpenAlex
Cite This
G. Yuval
(1979).
HOW TO SWINDLE RABIN.
Cryptologia
, 3
(3)
, 187-191.
https://doi.org/10.1080/0161-117991854025
Identifiers
- DOI
- 10.1080/0161-117991854025