General Comments About Public-Key Cryptosystems
Slow.
Vulnerable to exhaustive search, and chosen-ciphertext attacks.
Previous slide
Next slide
Back to first slide
View graphic version