What are the prospects for a theoretical breakthrough in the
discrete log problem ?
No Answer is Posted For this Question
Be the First to Post Answer
What are the most important attacks on MACs ?
How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
What is blowfish?
What are micropayments ?
What is tamper-resistant hardware ?
What is PKCS ?
Are certifying authorities susceptible to attack?
How does the Clipper chip work?
What are visual secret sharing schemes?
What is the discrete log problem?
What are the best factoring methods in use today ?
What key management issues are involved in public-key cryptography?