Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Phi-hiding assumption

Known as: Φ-hiding assumption 
The phi-hiding assumption or Φ-hiding assumption is an assumption about the difficulty of finding small factors of φ(m) where m is a number whose… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital signature scheme in practice. Its two main strengths are… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Thom Brooks's Hegel's Political Philosophy: A Systematic Reading of the Philosophy of Right presents a very clear and… Expand
Is this relevant?
2012
2012
RSA Full Domain Hash (RSA-FDH) is a digital signature scheme, secure again chosen message attacks in the random oracle model. The… Expand
Is this relevant?
2011
2011
In this paper I take the human sciences to comprise psychology, social, economic, and political sciences, archaeology, history… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Abstract The denudation rate signal of the Bolivian Andes as measured by cosmogenic 10 Be in sediment is preserved in the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Most cryptographic protocols, in particular asymmetricprotocols, are based on assumptions about the computationalcomplexity of… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2003
2003
1 National Results 2000/2001 Cumulative Performance of Employment Service Jobcentres in Great Britain. 0 5 10 15 Gl asgow South… Expand
  • table 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe a novel and efficient protocol for the following problem: <italic>A</italic> wants to buy some good from <italic>B… Expand
Is this relevant?
1977
1977
 
  • table 2
  • table 3
Is this relevant?