1. This section made little sense to me. It seemed like they were pulling random numbers out of a hat and putting them together. I didn't understand the Proposition at the beginning, which probably contributing to not understanding the rest of the section.
2. I'm interested to see how this is used in terms of RSA. I figure it breaks down somewhere, or RSA wouldn't be secure. Or I didn't understand the section and that's not even applicable.
No comments:
Post a Comment