• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

A method for obtaining digital signatures and public-key cryptosystems. (1978)

Cached

  • Download as a PDF

Download Links

  • [www.math.ubc.ca]
  • [people.csail.mit.edu]
  • [www.matha.mathematik.uni-dortmund.de]
  • [courses.cs.vt.edu]
  • [courses.cs.vt.edu]
  • [theory.lcs.mit.edu]
  • [csail.mit.edu]
  • [theory.csail.mit.edu]
  • [people.csail.mit.edu]
  • [www.cs.sfu.ca]
  • [signallake.com]
  • [www.signallake.com]
  • [classes.soe.ucsc.edu]
  • [www.bio.disco.unimib.it]
  • [www.csie.fju.edu.tw]
  • [www.site.uottawa.ca]
  • [www.cs.sfu.ca]
  • [www.cse.psu.edu]
  • [www.cs.gmu.edu]
  • [people.csail.mit.edu]
  • [theory.lcs.mit.edu]
  • [www.cs.utsa.edu]
  • [www.math.cornell.edu]
  • [www.math.cornell.edu]
  • [www.kemt.fei.tuke.sk]
  • [theory.csail.mit.edu]
  • [www.math.uconn.edu]
  • [securespeech.cs.cmu.edu]
  • [www.math.ubc.ca]
  • [www.cs.cmu.edu]
  • [www.cs.tau.ac.il]
  • [www.cwu.edu]
  • [pv.bstu.ru]
  • [www.reteam.org]
  • [www.selmer.uib.no]
  • [www.cs.toronto.edu]
  • [www.cs.toronto.edu]
  • [www.facweb.iitkgp.ernet.in]
  • [www.facweb.iitkgp.ernet.in]
  • [www.facweb.iitkgp.ernet.in]
  • [people.csail.mit.edu]
  • [people.csail.mit.edu]
  • [www.math.ubc.ca]
  • [www.cs.toronto.edu]
  • [www.cs.toronto.edu]
  • [www.cwu.edu]
  • [www.reteam.org]
  • [www.cs.umass.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by R L Rivest , A Shamir , L Adleman
Venue:Communications of the ACM,
Citations:3888 - 24 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@ARTICLE{Rivest78amethod,
    author = {R L Rivest and A Shamir and L Adleman},
    title = {A method for obtaining digital signatures and public-key cryptosystems.},
    journal = {Communications of the ACM,},
    year = {1978}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. 2. A message can be "signed" using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in "electronic mail" and "electronic funds transfer" systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret prime numbers p and q. Decryption is similar; only a different, secret, power d is used, where e · d ≡ 1 (mod (p − 1) · (q − 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University