Back to Results
First PageMeta Content
Cryptography / Public-key cryptography / E-commerce / RSA / Three-pass protocol / Cryptosystem / XTR / Schmidt-Samoa cryptosystem


A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R.L. Rivest, A. Shamir, and L. Adleman∗ Abstract An encryption method is presented with the novel property that publicly revealing an encryption ke
Add to Reading List

Document Date: 2001-04-26 01:25:58


Open Document

File Size: 177,79 KB

Share Result on Facebook

City

Cambridge / /

Company

IBM / /

/

Facility

Massachusetts Institute of Technology / /

IndustryTerm

electronic mail systems / telephone directory / obvious applications / secure communications / encryption device / bank / decryption algorithms / direct search / telephone conversation / insecure communications / decryption algorithm / few special-purpose integrated circuit chips / specified product / telephone lines makes encryption / encryption devices / hardware encryption devices / encryption algorithm / /

Organization

office of Naval Research / National Science Foundation / National Bureau of Standards / Laboratory for Computer Science / Massachusetts Institute of Technology / Association for Computing Machinery / /

Person

Bob / Ralph Merkle / Alice / /

Position

Author / correspondent / public file manager / General / judge / /

ProvinceOrState

Massachusetts / /

Technology

encryption / cryptography / telephone lines makes encryption / integrated circuit chips / public key / encryption algorithm / Data Encryption / An encryption / deciphering algorithm / decryption algorithm / decryption algorithms / enciphering algorithm / /

SocialTag