作者: Maria Isabel González Vasco , Mats Näslund
DOI: 10.1007/978-3-0348-8295-8_18
关键词:
摘要: The security of public key protocols relies nowadays on the use one-way functions. However, even assuming a certain function f(x) is hard enough to invert, we should always keep in mind fact that some information may leak through. A b(x) does not this way said be core for f; given f(x), cannot computationally distinguished from random string. In survey, review what known area, both more theoretical point view and also ‘practical’ choices f such as RSA.