Skip to main content

Public-key cryptography depending on computational number theory

  • Chapter
  • First Online:
Public-Key Cryptography: State of the Art and Future Directions

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 578))

  • 179 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Editor information

Thomas Beth Markus Frisch Gustavus J. Simmons

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

(1992). Public-key cryptography depending on computational number theory. In: Beth, T., Frisch, M., Simmons, G.J. (eds) Public-Key Cryptography: State of the Art and Future Directions. Lecture Notes in Computer Science, vol 578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-55215-4_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-55215-4_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-55215-4

  • Online ISBN: 978-3-540-46780-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics