EconPapers    
Economics at your fingertips  
 

Introduction

Tibor Jager

Chapter 1 in Black-Box Models of Computation in Cryptology, 2012, pp 1-3 from Springer

Abstract: Abstract The security of many cryptosystems relies on assumptions that certain computational problems, mostly from number theory and algebra, are intractable. Therefore it is important to study the validity of these assumptions. Ideally, we would like to show that these assumptions hold in a standard model of computation, e.g. where algorithms intending to solve a computational problem are modeled as Turing machines with reasonably restricted running time. Unfortunately, proving useful lower complexity bounds in the standard model seems to be impossible with currently available techniques.

Date: 2012
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-8348-1990-1_1

Ordering information: This item can be ordered from
http://www.springer.com/9783834819901

DOI: 10.1007/978-3-8348-1990-1_1

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-11-30
Handle: RePEc:spr:sprchp:978-3-8348-1990-1_1