... of obtaining such data in an undetectable fashion with high security guarantees. ... The malicious designer can act as a passive eavesdropper on all of Alice and ...
if q is composite or gcd(e,q - 1) 1 then goto step 3 ... The value c is not hidden much by the high order bits of n ... point G0 having order q0 that is on ...