Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
Journals and Conferences
This paper describes details of procedure for breaking a product sum or subset sum public key cryptosystem with two blocks of cipher text which has a random sequence in the message. This attack can… (More)