Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,369,738 papers from all fields of science
Search
Sign In
Create Free Account
RSA problem
In cryptography, the RSA problem summarizes the task of performing an RSA private-key operation given only the public key. The RSA algorithm raises a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computational hardness assumption
Cryptography
Generic group model
Integer factorization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Study of Bose-Einstein correlations in pp, pPb, and PbPb collisions at $\sqrt{s_\mathrm{NN}} =$ 0.9-7 TeV
Cms Collaboration
2017
Corpus ID: 204934656
Quantum statistical (Bose-Einstein) two-particle correlations are measured in pp collisions at $\sqrt{s}=$ 0.9, 2.76, and 7 TeV…
Expand
2016
2016
Efficient routing and spectrum assignment in elastic optical networks with time scheduled traffic
Yang Qiu
,
Zheyu Fan
,
Chun-Kit Chan
2016
Corpus ID: 49543463
2015
2015
Explorer Exploiting separability in large-scale linear support vector machine training
K. Woodsend
,
J. Gondzio
2015
Corpus ID: 8313521
Linear support vector machine training can be represented as a large quadratic program. We present an efficient and numerically…
Expand
2014
2014
Alternative routing and zone-based spectrum assignment algorithm for flexgrid optical networks
R. Scaraficci
,
N. Fonseca
IEEE International Conference on Communications…
2014
Corpus ID: 14411903
In optical flexgrid networks, the optical spectrum can be allocated at a much finer granularity than it can be in fixed-grid WDM…
Expand
2007
2007
Small primitive roots and malleability of RSA moduli
L. Dieulefait
,
J. Urróz
2007
Corpus ID: 115156186
In a paper of P. Paillier and J. Villar a conjecture is made about the malleability of an RSA modulus. In this paper we present…
Expand
2007
2007
Proxy-protected signature secure against the undelegated proxy signature attack
Yu-Chuan Liu
,
Hsiang-An Wen
,
Chun-Li Lin
,
T. Hwang
Computers & electrical engineering
2007
Corpus ID: 30775962
2005
2005
A monotonic-decreasing rate scheduler for variable-bit-rate video streaming
H. Lai
,
Jack Y. B. Lee
,
Lian-Kuan Chen
IEEE transactions on circuits and systems for…
2005
Corpus ID: 7513516
Variable-bit-rate (VBR) encoded videos can provide a more consistent visual quality than constant-bit-rate (CBR) encoded videos…
Expand
1999
1999
Notes onn-D Polynomial Matrix Factorizations
Zhiping Lin
,
Z. Lin
1999
Corpus ID: 33337829
This paper discusses a relationship between the prime factorizability of a normal full rank n-D (n > 2) polynomial matrix and its…
Expand
1994
1994
Abstracting Synchronization in Concurrent Constraint Programming
E. Zaffanella
,
R. Giacobazzi
,
G. Levi
Journal of Functional and Logic Programming
1994
Corpus ID: 2637120
Because of synchronization based on blocking ask, some of the most important techniques for data flow analysis of (sequential…
Expand
1980
1980
A Note on Resolution: How to Get Rid of Factoring without Loosing Completeness
H. Noll
CADE
1980
Corpus ID: 36404409
It is often useful to simplify the resolution inference system by elimination of factoring. Factoring, however, cannot be ignored…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE