Amanote Research

Amanote Research

    RegisterSign In

Selecting Cryptographic Key Sizes

Journal of Cryptology - United States
doi 10.1007/s00145-001-0009-4
Full Text
Open PDF
Abstract

Available in full text

Categories
Applied MathematicsComputer Science ApplicationsSoftware
Date

August 14, 2001

Authors
Arjen K. LenstraEric R. Verheul
Publisher

Springer Science and Business Media LLC


Related search

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

2010English

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

2007English

Recommendation for Cryptographic Key Generation

2019English

RSA Cryptographic Key Generation Using Fingerprint Minutiae

Iraqi Journal for Computers and Informatics
2014English

NSA's Cryptographic Message Syntax (CMS) Key Management Attributes

2016English

Cryptographic Key Generation Based on Contextual Information: A Review

International Journal of Computer Applications
2016English

Extending Cryptographic Logics of Belief to Key Agreement Protocols

1993English

Estimating Key Sizes for High Dimensional Lattice-Based Systems

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Fully Homomorphic Encryption With Relatively Small Key and Ciphertext Sizes

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy