next up previous
Next: The Bit Security of Up: The Post-Doctoral Period (1983-86) Previous: A Fair Protocol for

On the Security of Ping-Pong Protocols when Implemented Using the RSA


Comments: Authored by S. Even, O. Goldreich and A. Shamir. Appeared in



Oded Goldreich
2003-07-30