Browsing by Subject "exhaustive enumeration"
Now showing items 1-1 of 1
-
Chinks in the armor of public key cryptosystems
(1994-03)Potential weaknesses in public key cryptosystem design and use are identified with emphasis on a particular vulnerability resulting from the encryption of ordinary natural language plaintext. This weakness occurs when an ...