Breadcrumbs Section. Click here to navigate to respective pages.
Chapter

Chapter
Number-Theoretic Reference Problems
DOI link for Number-Theoretic Reference Problems
Number-Theoretic Reference Problems book
Number-Theoretic Reference Problems
DOI link for Number-Theoretic Reference Problems
Number-Theoretic Reference Problems book
ABSTRACT
The security of many public-key cryptosystems relies on the apparent intractability of the computational problems studied in this chapter. In a cryptographic setting, it is prudent to make the assumption that the adversary is very powerful. Thus, informally speaking, a computational problem is said to be easy or tractable if it can be solved in (expected) 1 polynomial time, at least for a non-negligible fraction of all possible inputs. In other words, if there is an algorithm which can solve a non-negligible fraction of all instances of a problem in polynomial time, then any cryptosystem whose security is based on that problem must be considered insecure.