(a) | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
(b) | |||||||||||||||||||||||||||||||||
|
Research Article
Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
Table 3
(a) The number of operations needed to factor with GNFS method. (b) Computing without Factoring “”