Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,762 papers from all fields of science
Search
Sign In
Create Free Account
Phi-hiding assumption
Known as:
Φ-hiding assumption
The phi-hiding assumption or Φ-hiding assumption is an assumption about the difficulty of finding small factors of φ(m) where m is a number whose…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Computational hardness assumption
Cryptosystem
Private information retrieval
Broader (1)
Computational number theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Lossy Trapdoor Permutations with Improved Lossiness
Benedikt Auerbach
,
Eike Kiltz
,
Bertram Poettering
,
Stefan Schoenen
IACR Cryptology ePrint Archive
2019
Corpus ID: 54555478
Lossy trapdoor functions (Peikert and Waters, STOC 2008 and SIAM J. Computing 2011) imply, via black-box transformations, a…
Expand
2018
2018
On the Security of the PKCS#1 v1.5 Signature Scheme
Tibor Jager
,
Saqib A. Kakvi
,
Alexander May
IACR Cryptology ePrint Archive
2018
Corpus ID: 52977709
The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital signature scheme in practice. Its two main strengths are…
Expand
Highly Cited
2012
Highly Cited
2012
Optimal Security Proofs for Full Domain Hash, Revisited
Saqib A. Kakvi
,
Eike Kiltz
Journal of Cryptology
2012
Corpus ID: 16277864
RSA Full Domain Hash (RSA-FDH) is a digital signature scheme, secure against chosen message attacks in the random oracle model…
Expand
2011
2011
Normativity is the Key to the Difference Between the Human and the Natural Sciences
W. Spohn
2011
Corpus ID: 16161609
In this paper I take the human sciences to comprise psychology, social, economic, and political sciences, archaeology, history…
Expand
Highly Cited
2009
Highly Cited
2009
From source to sink: Preserving the cosmogenic 10Be-derived denudation rate signal of the Bolivian Andes in sediment of the Beni and Mamoré foreland basins
H. Wittmann
,
F. Blanckenburg
,
J. Guyot
,
L. Maurice
,
P. Kubik
2009
Corpus ID: 53464875
2008
2008
On the Validity of the phi-Hiding Assumption in Cryptographic Protocols
C. Schridde
,
Bernd Freisleben
International Conference on the Theory and…
2008
Corpus ID: 15951347
Most cryptographic protocols, in particular asymmetricprotocols, are based on assumptions about the computationalcomplexity of…
Expand
2008
2008
Standardizing file formats , security , and integration of digital chest image files for pneumoconiosis classification
D. Clunie
2008
Corpus ID: 27870272
2003
2003
Disability Employment on the Agenda
John R. Bryant
2003
Corpus ID: 162108477
1 National Results 2000/2001 Cumulative Performance of Employment Service Jobcentres in Great Britain. 0 5 10 15 Gl asgow South…
Expand
1977
1977
Professional structure in South East Asia
T. H. Silcock
1977
Corpus ID: 160252487
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE