1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
Ron Rivest
Adi Shamir
Leonard Adleman
PKCS1
ANSI X9.31
P1363
General number field sieve
Shor's algorithm
RSA-768
public-key cryptography
cryptosystem
encryption key
decryption key
factorization
prime number
factoring problem
acronym
Ron Rivest
Adi Shamir
Leonard Adleman
Clifford Cocks
Government Communications Headquarters
classified information
Bristol University
prime number
Communications of the ACM
encryption
RSA problem
symmetric-key algorithm
Adi Shamir
Ron Rivest
Leonard Adleman
Whitfield Diffie
Martin Hellman
Ron Rivest
Adi Shamir
Leonard Adleman
Massachusetts Institute of Technology
Knapsack problem
Passover
Manischewitz
Clifford Cocks
mathematician
United Kingdom
Government Communications Headquarters
Data Encryption Standard#Simplified DES
Massachusetts Institute of Technology
term of patent
RSA Security
filing date
patent application
patent
United States
Derwent World Patent Index
Key (cryptography)
modular exponentiation
private key
prime number
Communications of the ACM
primality test
Modular arithmetic
key length
least common multiple
Carmichael's totient function
greatest common divisor
coprime
modular multiplicative inverse
bit-length
Hamming weight
Notices of the American Mathematical Society
Euler totient function
Euler totient function
Lagrange's theorem (group theory)
multiplicative group of integers modulo n
Neal Koblitz
modular multiplicative inverse
PKCS1
Alice and Bob
Alice and Bob
b:Cryptography/Generate a keypair using OpenSSL
Carmichael's totient function
least common multiple
coprime
modular multiplicative inverse
plaintext
ciphertext
square-and-multiply algorithm
modular exponentiation
Chinese remainder theorem
cryptographically secure pseudorandom number generator
Alice and Bob
Alice and Bob
digital signature
cryptographic hash function
Fermat's little theorem
least common multiple
Chinese remainder theorem
Fermat's little theorem
Euler's theorem
Euler's theorem
Carmichael function#Carmichael's theorem
Chinese remainder theorem
Johan Håstad
Don Coppersmith
Journal of Cryptology
deterministic algorithm
chosen plaintext attack
semantically secure
Shafi Goldwasser
Silvio Micali
chosen-ciphertext attack
Padding (cryptography)
PKCS1
International Cryptology Conference
adaptive chosen ciphertext attack
Eurocrypt
Optimal Asymmetric Encryption Padding
RSA-PSS
OpenSSL
Java (programming language)
.NET
Chinese remainder theorem
exponentiation by squaring
integer factorization
RSA problem
padding (cryptography)
RSA problem
integer factorization
Generalized Riemann hypothesis
RSA number
RSA-768
bit
personal computer
RSA-155
TWIRL
Peter Shor
quantum computer
polynomial time
Shor's algorithm
primality test
Fermat factorization
Pollard's p − 1 algorithm
Michael J. Wiener
Coppersmith's Attack
65537
Masaryk University
ROCA vulnerability
Infineon
random number generator
Arjen Klaas Lenstra
Euclid's algorithm
The New York Times
Nadia Heninger
Daniel J. Bernstein
atmospheric noise
Paul Kocher
Dan Boneh
David Brumley
Secure Sockets Layer
Chinese remainder theorem
blinding (cryptography)
Euler's Theorem
Daniel Bleichenbacher
adaptive chosen ciphertext attack
Padding (cryptography)
Secure Socket Layer
Optimal Asymmetric Encryption Padding
branch predictor
simultaneous multithreading
Onur Aciicmez
Cetin Kaya Koc
Botan (programming library)
Bouncy Castle (cryptography)
cryptlib
Crypto++
Libgcrypt
Nettle (cryptographic library)
OpenSSL
WolfSSL#wolfCrypt
Acoustic cryptanalysis
Computational complexity theory
Cryptographic key length
Diffie–Hellman key exchange
Key exchange
Key management
Public-key cryptography
Trapdoor function
Introduction to Algorithms
RSA Laboratories
PKCS
standardization
public-key cryptography
Primitive type
encryption
Digital signature
ASN.1
Brady Haran