Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,363,077 papers from all fields of science
Search
Sign In
Create Free Account
RSA problem
In cryptography, the RSA problem summarizes the task of performing an RSA private-key operation given only the public key. The RSA algorithm raises a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computational hardness assumption
Cryptography
Generic group model
Integer factorization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Online Low-Rank Metric Learning via Parallel Coordinate Descent Method
Gan Sun
,
Yang Cong
,
Qiang Wang
,
Xiaowei Xu
International Conference on Pattern Recognition
2018
Corpus ID: 54436773
11The corresponding author is Prof. Yang Cong. This work is supported by Nature Science Foundation of China under Grant (61722311…
Expand
2015
2015
Explorer Exploiting separability in large-scale linear support vector machine training
K. Woodsend
,
J. Gondzio
2015
Corpus ID: 8313521
Linear support vector machine training can be represented as a large quadratic program. We present an efficient and numerically…
Expand
2012
2012
A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem
M. Ariffin
2012
Corpus ID: 16829106
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption…
Expand
2012
2012
Complex loss optimization via dual decomposition
Mani Ranjbar
,
Arash Vahdat
,
Greg Mori
IEEE Conference on Computer Vision and Pattern…
2012
Corpus ID: 646789
We describe a novel max-margin parameter learning approach for structured prediction problems under certain non-decomposable…
Expand
2010
2010
Exploiting Within-Clique Factorizations in Junction-Tree Algorithms
Julian McAuley
,
T. Caetano
International Conference on Artificial…
2010
Corpus ID: 9535568
We show that the expected computational complexity of the Junction-Tree Algorithm for maximum a posteriori inference in graphical…
Expand
2009
2009
Chosen-Ciphertext Secure RSA-Type Cryptosystems
Benoît Chevallier-Mames
,
M. Joye
Provable Security
2009
Corpus ID: 5955148
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the…
Expand
2009
2009
High-multiplicity final states and transverse-momentum dependent parton showering at hadron colliders
F. Hautmann
2009
Corpus ID: 17260807
If large-angle multigluon radiation gives significant contributions to parton showers in the LHC high-energy region, appropriate…
Expand
2007
2007
Specifying, Verifying and Implementing a MAS : A Case study
B. Mermet
,
G. Simon
,
Arnaud Saval
,
B. Zanuttini
2007
Corpus ID: 13804677
This paper deals with the design of multi-agent systems. We demonstrate the goal-oriented agent model called Goal Decomposition…
Expand
2006
2006
Factorization of Device Driver Code between Kernel and User Spaces
Arini Balakrishnan
,
S. Krishnan
2006
Corpus ID: 17213399
Device drivers, which are normally implemented as kernel code, pose stability problems since bugs in the drivers cause kernel…
Expand
1980
1980
A Note on Resolution: How to Get Rid of Factoring without Loosing Completeness
H. Noll
CADE
1980
Corpus ID: 36404409
It is often useful to simplify the resolution inference system by elimination of factoring. Factoring, however, cannot be ignored…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE