Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Introduction to R-sequence public key cryptography attack
Dec 11 2011 01:34PM
Michal Bucko (michal bucko eleytt com)
I have informed the responsible institutions 6 months ago before posting
this message on public key cryptography.
Below, I'm presenting an introduction to R-sequence theory, allowing more
accurate analysis of verification of groups of primes (and more) and
distribution of primes.
[ more ]
Copyright 2010, SecurityFocus