Key Lengths
Arjen K. Lenstra, Lucent Technologies Bell Laboratories and Technische Universiteit Eindhoven
Symmetric Encryption and Cryptographic Hashing
Relation Between Security Level and Security
Modeling the Effect of Changes in the Computational Environment
The Cost of Adequate Protection
The Effect of the Constant of Proportionality
Alternative Definitions of Adequate Protection
Modeling the Effect of Changes in Cryptanalytic Capabilities
Symmetric Key Lengths That Offer Adequate Protection
Cryptographic Hash Lengths That Offer Adequate Protection
The Design of Asymmetric Cryptosystems
Factoring and Discrete Logarithms
Other Asymmetric Cryptosystems
Exponential Time Factoring Algorithms
Polynomial Time Factoring Algorithms
Subexponential Time Factoring Algorithms
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.