Skip to search formSkip to main contentSkip to account menu

Phi-hiding assumption

Known as: Φ-hiding assumption 
The phi-hiding assumption or Φ-hiding assumption is an assumption about the difficulty of finding small factors of φ(m) where m is a number whose… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Lossy trapdoor functions (Peikert and Waters, STOC 2008 and SIAM J. Computing 2011) imply, via black-box transformations, a… 
2018
2018
The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital signature scheme in practice. Its two main strengths are… 
Highly Cited
2012
Highly Cited
2012
RSA Full Domain Hash (RSA-FDH) is a digital signature scheme, secure against chosen message attacks in the random oracle model… 
2011
2011
In this paper I take the human sciences to comprise psychology, social, economic, and political sciences, archaeology, history… 
2008
2008
Most cryptographic protocols, in particular asymmetricprotocols, are based on assumptions about the computationalcomplexity of… 
2003
2003
1 National Results 2000/2001 Cumulative Performance of Employment Service Jobcentres in Great Britain. 0 5 10 15 Gl asgow South…