Browsing by Subject "exhaustive enumeration"

Now showing items 1-1 of 1

  • Chinks in the armor of public key cryptosystems

    Wilson, William J. (1994-03)
    Potential weaknesses in public key cryptosystem design and use are identified with emphasis on a particular vulnerability resulting from the encryption of ordinary natural language plaintext. This weakness occurs when an ...