Skip to search formSkip to main contentSkip to account menu

Phi-hiding assumption

Known as: Φ-hiding assumption 
The phi-hiding assumption or Φ-hiding assumption is an assumption about the difficulty of finding small factors of φ(m) where m is a number whose… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital signature scheme in practice. Its two main strengths are… 
2018
2018
Lossy trapdoor functions (Peikert and Waters, STOC 2008 and SIAM J. Computing 2011) imply, via black-box transformations, a… 
Highly Cited
2017
Highly Cited
2017
RSA Full Domain Hash (RSA-FDH) is a digital signature scheme, secure against chosen message attacks in the random oracle model… 
2011
2011
In this paper I take the human sciences to comprise psychology, social, economic, and political sciences, archaeology, history… 
2008
2008
Most cryptographic protocols, in particular asymmetricprotocols, are based on assumptions about the computationalcomplexity of… 
2003
2003
1 National Results 2000/2001 Cumulative Performance of Employment Service Jobcentres in Great Britain. 0 5 10 15 Gl asgow South… 
Highly Cited
1999
Highly Cited
1999
  • C. Cachin
  • Conference on Computer and Communications…
  • 1999
  • Corpus ID: 52318038
We describe a novel and efficient protocol for the following problem: <italic>A</italic> wants to buy some good from <italic>B…