From: Turing's Worst Nightmare on
A NP algorithm can break any asymmetric cryptographic system that
guesses of the secret key “to decrypt and verify the process, the
actual recipient would use the message or efficient.
From: Turing's Worst Nightmare on
On May 19, 7:12 am, "Turing's Worst Nightmare"
<marty.musa...(a)gmail.com> wrote:
> A NP algorithm can break any asymmetric cryptographic system that
> guesses of the secret key “to decrypt and verify the process, the
> actual recipient would use the message or efficient.

A NP algorithm can break any asymmetric cryptographic system that
guesses of the secret key “to decrypt and verify the process, the
actual recipient would use the message or efficient.
From: Ostap Bender on
On May 19, 7:12 am, "Turing's Worst Nightmare"
<marty.musa...(a)gmail.com> wrote:
> A NP algorithm can break any asymmetric cryptographic system that
> guesses of the secret key “to decrypt and verify the process, the
> actual recipient would use the message or efficient.

I would hope so. But if it is a non-deterministic algorithm, how do
you plan to implement it on your computer?