Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,399,338 papers from all fields of science
Search
Sign In
Create Free Account
RSA problem
In cryptography, the RSA problem summarizes the task of performing an RSA private-key operation given only the public key. The RSA algorithm raises a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computational hardness assumption
Cryptography
Generic group model
Integer factorization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Efficient routing and spectrum assignment in elastic optical networks with time scheduled traffic
Yang Qiu
,
Zheyu Fan
,
Chun-Kit Chan
2016
Corpus ID: 49543463
2015
2015
Explorer Exploiting separability in large-scale linear support vector machine training
K. Woodsend
,
J. Gondzio
2015
Corpus ID: 8313521
Linear support vector machine training can be represented as a large quadratic program. We present an efficient and numerically…
Expand
2014
2014
Alternative routing and zone-based spectrum assignment algorithm for flexgrid optical networks
R. Scaraficci
,
N. Fonseca
IEEE International Conference on Communications…
2014
Corpus ID: 14411903
In optical flexgrid networks, the optical spectrum can be allocated at a much finer granularity than it can be in fixed-grid WDM…
Expand
2009
2009
High-multiplicity final states and transverse-momentum dependent parton showering at hadron colliders
F. Hautmann
2009
Corpus ID: 17260807
If large-angle multigluon radiation gives significant contributions to parton showers in the LHC high-energy region, appropriate…
Expand
2007
2007
Small primitive roots and malleability of RSA moduli
L. Dieulefait
,
J. Urróz
2007
Corpus ID: 115156186
In a paper of P. Paillier and J. Villar a conjecture is made about the malleability of an RSA modulus. In this paper we present…
Expand
2007
2007
Proxy-protected signature secure against the undelegated proxy signature attack
Yu-Chuan Liu
,
Hsiang-An Wen
,
Chun-Li Lin
,
T. Hwang
Computers & electrical engineering
2007
Corpus ID: 30775962
2007
2007
Hierarchical Artificial Neural Networks for Recognizing High Similar Large Data Sets
Yen-Ling Lu
,
C. Fahn
International Conference on Machine Learning and…
2007
Corpus ID: 25642542
This paper proposes a hierarchical artificial neural network for recognizing high similar large data sets. It is usually required…
Expand
2005
2005
A monotonic-decreasing rate scheduler for variable-bit-rate video streaming
H. Lai
,
Jack Y. B. Lee
,
Lian-Kuan Chen
IEEE transactions on circuits and systems for…
2005
Corpus ID: 7513516
Variable-bit-rate (VBR) encoded videos can provide a more consistent visual quality than constant-bit-rate (CBR) encoded videos…
Expand
1999
1999
Notes onn-D Polynomial Matrix Factorizations
Zhiping Lin
,
Z. Lin
1999
Corpus ID: 33337829
This paper discusses a relationship between the prime factorizability of a normal full rank n-D (n > 2) polynomial matrix and its…
Expand
1980
1980
A Note on Resolution: How to Get Rid of Factoring without Loosing Completeness
H. Noll
CADE
1980
Corpus ID: 36404409
It is often useful to simplify the resolution inference system by elimination of factoring. Factoring, however, cannot be ignored…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE