Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
75 | Jakob Jonsson, Burton S. Kaliski Jr. |
On the Security of RSA Encryption in TLS. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
key encapsulation, RSA encryption, TLS |
70 | Ulrich Kühn 0001 |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
RSA encryption, Side-channel attack, ElGamal encryption |
62 | David Pointcheval |
New Public Key Cryptosystems Based on the Dependent-RSA Problems. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks |
62 | Josef Pieprzyk, David Pointcheval |
Josef Pieprzyk, David Pointcheval. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, parallelization, Signcryption |
60 | Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar |
An Efficient RSA Public Key Encryption Scheme. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
RSA public encryption scheme, square matrices, general linear group, digital signature scheme |
58 | Amos Fiat |
Batch RSA. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
48 | Dan Boneh, Antoine Joux, Phong Q. Nguyen |
Why Textbook ElGamal and RSA Encryption Are Insecure. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Benny Chor, Oded Goldreich 0001 |
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
38 | Apostolos P. Fournaris, Odysseas G. Koufopavlou |
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication. |
ISCAS (5) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Nick A. Moldovyan |
New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. |
IF&GIS |
2007 |
DBLP DOI BibTeX RDF |
public encryption, Digital signature, public key cryptosystem, key agreement protocol |
36 | Kaoru Kurosawa, Toshihiko Matsuo |
How to Remove MAC from DHIES. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
DHIES, hybrid encryption scheme |
34 | Jonathan Katz |
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). |
SIGACT News |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Ping Li 0034, Yaping Lin |
A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Vlastimil Klíma, Tomás Rosa |
Further Results and Considerations on Side Channel Attacks on RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Mihir Bellare, Phillip Rogaway |
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
32 | Guillaume Barbu |
FA-LLLing for RSA: Lattice-based Fault Attacks against RSA Encryption and Signature. |
FDTC |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Wenbo Mao |
Timed-Release Cryptography. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Christophe Coupé, Phong Q. Nguyen, Jacques Stern |
The Effectiveness of Lattice Attacks Against Low-Exponent RSA. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
31 | Koji Nakano, Kensuke Kawakami, Koji Shigemoto |
RSA encryption and decryption using the redundant number system on the FPGA. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Glenn A. Orton, M. P. Roy, P. Andrew Scott, Lloyd E. Peppard, Stafford E. Tavares |
VLSI Implementation of Public-Key Encryption Algorithms. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
26 | Keklik Alptekin Bayam, Siddika Berna Örs |
Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern |
Index Calculation Attacks on RSA Signature and Encryption. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
cryptanalsis, Index Calculation, ISO 9796, RSA, smoothness, signature, forgery |
26 | Yi Wang, Zhiping Tan |
Modified RSA Encryption Algorithm Based on Chaos and Its Application in Voice Encryption System. |
CIS |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Wenhe Fang, Guohe Li, Weijiang Wu, Yunfeng Hong, Xiaoming Zhou |
面向Android的RSA算法优化与二维码加密防伪系统设计 (Optimization of RSA Encryption Algorithm for Android Mobile Phone and Design of QR Code Encryption Security System). |
计算机科学 |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
A Black Hen Lays White Eggs. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
double-size technique, RSA, smartcard, Montgomery multiplication, efficient implementation |
24 | Ernest F. Brickell |
A Survey of Hardware Implementation of RSA (Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
22 | Johan Håstad, Mats Näslund |
The security of all RSA and discrete log bits. |
J. ACM |
2004 |
DBLP DOI BibTeX RDF |
RSA-encryption, bit-security, complexity, Cryptography, discrete logarithms |
22 | Johann Großschädl |
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency |
22 | Peter Kornerup |
A Systolic, Linear-Array Multiplier for a Class of Right-Shift Algorithms. |
IEEE Trans. Computers |
1994 |
DBLP DOI BibTeX RDF |
systolic linear-array multiplier, right-shift algorithms, multiplier cell, digit-product terms, least significant digit first, active elements, module-multiplier, Montgomery module-reduction, RSA encryption, modular division, cryptography, logic design, systolic arrays, systolic array, digital arithmetic, multiplying circuits, latches, modular inverses, Hensel codes, digit-serial multiplier |
22 | Lein Harn, David Huang |
A Protocol for Establishing Secure Communication Channels in a Large Network. |
IEEE Trans. Knowl. Data Eng. |
1994 |
DBLP DOI BibTeX RDF |
secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange |
19 | Yongdong Wu, Feng Bao 0001 |
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-Based Sessions in SSL/TLS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Johann Großschädl |
High-Speed RSA Hardware Based on Barret's Modular Reduction Method. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic |
19 | Priyadharshini Kaliyamoorthy, Aroul Canessane Ramalingam |
Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption. |
Int. J. Inf. Secur. Priv. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Ibrahim F. Elashry |
Cryptanalysis of Jain-Singh's identity-based RSA encryption. |
Inf. Secur. J. A Glob. Perspect. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Huifang Wang, Kang Zhou, Gexiang Zhang, Prithwineel Paul, Yingying Duan, Huaqing Qi, Haina Rong |
Application of Weighted Spiking Neural P Systems with Rules on Synapses for Breaking RSA Encryption. |
Int. J. Unconv. Comput. |
2020 |
DBLP BibTeX RDF |
|
19 | Zhibo Wang, Wei Ma, Bei Gong |
An Attack Scheme of RSA Encryption System with Protocol Failure. |
SmartBlock |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Danenkov Ilya, Alexey A. Margun, Radda A. Iureva, Artem Kremlev |
Protected Control System with RSA Encryption. |
KES-AMSTA |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Salma Ezziri, Omar Khadir |
Amelioration of a proxy signature using RSA encryption. |
NISS |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Yang Liu, Shanyu Tang, Ran Liu, Liping Zhang 0003, Zhao Ma |
Secure and robust digital image watermarking scheme using logistic and RSA encryption. |
Expert Syst. Appl. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Feng-Hsiag Hsiao |
Chaotic synchronization cryptosystems combined with RSA encryption algorithm. |
Fuzzy Sets Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Said E. El-Khamy, Noha O. Korany, Marwa H. El-Sherif |
A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. |
Multim. Tools Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Bei Cao, Tianliang Xu, Pengfei Wu |
RSA Encryption Algorithm Design and Verification Based on Verilog HDL. |
MLICOM (1) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Xu Bai, Lei Jiang 0003, Xinxing Liu, Jianlong Tan |
RSA Encryption/Decryption Implementation Based on Zedboard. |
ISCTCS |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Chu-Hsing Lin, Jung-Chun Liu, Cheng-Chieh Li, Po-Wei Chu |
Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation. |
AsiaJCIS |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Shugang Wei |
An RSA encryption implementation method using residue signed-digit arithmetic circuits. |
BMEI |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Bo Song, Kensuke Kawakami, Koji Nakano, Yasuaki Ito |
An RSA Encryption Hardware Algorithm using a Single DSP Block and a Single Block RAM on the FPGA. |
Int. J. Netw. Comput. |
2011 |
DBLP BibTeX RDF |
|
19 | Loránd Szöllösi, Tamás Marosits, Gábor Fehér |
Accelerating RSA Encryption Using Random Precalculations. |
Int. J. Netw. Secur. |
2010 |
DBLP BibTeX RDF |
|
19 | Andrzej Chmielowiec |
Fixed points of the RSA encryption algorithm. |
Theor. Comput. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Bo Song, Kensuke Kawakami, Koji Nakano, Yasuaki Ito |
An RSA Encryption Hardware Algorithm Using a Single DSP Block and a Single Block RAM on the FPGA. |
ICNC |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Meng Haoyu |
The Study of the Electronic Gift Certificate System Based on 3G Mobile and RSA Encryption. |
ICEE |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Seth Bergmann |
Degenerate keys for RSA encryption. |
ACM SIGCSE Bull. |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Himanshu Thapliyal, M. B. Srinivas |
VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic Mathematics |
CoRR |
2006 |
DBLP BibTeX RDF |
|
19 | Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia |
Implementation of A Fast Square In RSA Encryption/Decryption Architecture. |
Security and Management |
2005 |
DBLP BibTeX RDF |
|
19 | Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia |
Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. |
Security and Management |
2005 |
DBLP BibTeX RDF |
|
19 | Omar Nibouche, Mokhtar Nibouche, Ahmed Bouridane, Ammar Belatreche |
Fast architectures for FPGA-based implementation of RSA encryption algorithm. |
FPT |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Ljupco Kocarev, Marjan Sterjev, Paolo Amato |
RSA encryption algorithm based on torus automorphisms. |
ISCAS (4) |
2004 |
DBLP BibTeX RDF |
|
19 | Gene Eu Jan, Lokar J. Y. Lin, W. R. Liou, Y. Y. Chen |
The Design and Implementation of a 2048-Bit RSA Encryption/Decryption Chip. |
VLSI |
2003 |
DBLP BibTeX RDF |
|
19 | Omar Nibouche, Mokhtar Nibouche, Ahmed Bouridane |
High speed FPGA implementation of RSA encryption algorithm. |
ICECS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Kiran Puttegowda, Peter Athanas |
RSA encryption using Extended Modular Arithmetic on the Quicksilver COSM Adaptive Computing Machine. |
FCCM |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Christopher Harm, Xiannong Meng |
Feasibility Study of Real-Time RSA Encryption in Mobile Computing. |
International Conference on Internet Computing |
2003 |
DBLP BibTeX RDF |
|
19 | Nobuhiro Tomabechi, Teruki Ito |
Design of a high-speed RSA encryption processor based on the residue table for redundant binary numbers. |
Syst. Comput. Jpn. |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Shugang Wei, Kensuke Shimizu |
Residue signed-digit arithmetic circuit with a complement of modulus and the application to RSA encryption processor. |
ICECS |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Nobuhiro Tomabechi, Teruki Ito |
Defect-tolerance design of the high-speed RSA encryption processor with built-in table for residue calculation of redundant binary numbers. |
ICECS |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Nobuhiro Tomabechi, Teruki Ito |
Design of a high-speed RSA encryption processor with built-in table for residue calculation of redundant binary numbers. |
ISCAS |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Chang N. Zhang, Hua Li |
DCSA Systolic Array for Modular Multiplication and RSA Encryption. |
PDPTA |
2000 |
DBLP BibTeX RDF |
|
19 | Burt Kaliski |
PKCS #1: RSA Encryption Version 1.5. |
RFC |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Bleichenbacher |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
PKCS, RSA, SSL, chosen ciphertext attack |
19 | Ari Musriami Barmawi, Shingo Takada 0001, Norihisa Doi |
Augmented encrypted key exchange using RSA encryption. |
PIMRC |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Akashi Satoh, Yoshinao Kobayashi, Hideto Niijima, Nobuyuki Ooba, Seiji Munetoh, Sadamichi Sone |
A High-Speed Small RSA Encryption LSI with Low Power Dissipation. |
ISW |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Shugang Wei, Michitaka Kameyama, Tatsuo Higuchi 0001 |
Performance evaluation of a multivalued rsa encryption vlsi. |
Syst. Comput. Jpn. |
1991 |
DBLP DOI BibTeX RDF |
|
19 | Michitaka Kameyama, Shugang Wei, Tatsuo Higuchi 0001 |
Design of an RSA Encryption Processor Based on Signed-Digit Multivalued Arithmetic Circuits. |
Syst. Comput. Jpn. |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ari Musriami Barmawi, Shingo Takada 0001, Norihisa Doi |
A Proposal for Generating Shared RSA Parameters. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Patrik Bichsel, Jan Camenisch, Thomas Groß 0001, Victor Shoup |
Anonymous credentials on a standard java card. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy-enhancing systems, smart card, java card, anonymous credential systems |
12 | Koji Shigemoto, Kensuke Kawakami, Koji Nakano |
Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs. |
EUC (1) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito |
A Tiny Processing System for Education and Small Embedded Systems on the FPGAs. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Kensuke Kawakami, Koji Shigemoto, Koji Nakano |
Redundant Radix-2r Number System for Accelerating Arithmetic Operations on the FPGAs. |
PDCAT |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Régis Leveugle |
Early Analysis of Fault-based Attack Effects in Secure Circuits. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
RTL dependability evaluation, security validation, fault models, fault injection, fault attacks |
12 | Young-Soo Kim, Seok-Soo Kim |
Delay Model for Flooding of Service Prevention in E-Commerce System. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Lasse Øverlier, Paul F. Syverson |
Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. |
Privacy Enhancing Technologies |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Fatih Gelgi, Melih Onus |
Heuristics for Minimum Brauer Chain Problem. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
Brauer chain, dynamic programming, greedy algorithms, exponentiation, addition chain |
12 | Yibo Fan, Xiaoyang Zeng, Yu Yu, Gang Wang, Qianling Zhang |
A modified high-radix scalable Montgomery multiplier. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Feng Gang |
Design of Modular Multiplier Based on Improved Montgomery Algorithm and Systolic Array. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Christoph Walther, Stephan Schweitzer |
Verification in the Classroom. |
J. Autom. Reason. |
2004 |
DBLP DOI BibTeX RDF |
computer uses in education, deduction and automated theorem proving, computer-aided verification |
12 | Nadia Nedjah, Luiza de Macedo Mourelle |
Fast Hardware of Booth-Barrett?s Modular Multiplication for Efficient Cryptosystems. |
ISCIS |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Alan Daly, William P. Marnane |
Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic. |
FPGA |
2002 |
DBLP DOI BibTeX RDF |
FPGA, encryption, RSA, public key, exponentiation, modular multiplication, montgomery |
12 | Nadia Nedjah, Luiza de Macedo Mourelle |
Minimal Addition Chain for Efficient Modular Exponentiation Using Genetic Algorithms. |
IEA/AIE |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Parallel Modular Exponentiation Algorithm. |
ADVIS |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Ari Moesriami Barmawi, Shingo Takada 0001, Norihisa Doi |
Robust Protocol for Generating Shared RSA Parameters. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Bertil Schmidt, Manfred Schimmler, Heiko Schröder 0001 |
Long Operand Arithmetic on Instruction Systolic Computer Architectures and Its Application in RSA Cryptography. |
Euro-Par |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Don Coppersmith |
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. |
J. Cryptol. |
1997 |
DBLP DOI BibTeX RDF |
RSA, RSA, Polynomial, Polynomial, Factoring, Factoring, Key words |
12 | Don Coppersmith |
Finding a Small Root of a Univariate Modular Equation. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
12 | James A. Davis, Diane B. Holdridge |
Factorization of Large Integers on a Massively Parallel Computer. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
12 | Paul Barrett |
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
12 | Ernest F. Brickell, John M. DeLaurentis |
An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
12 | Ronald L. Rivest |
RSA Chips (Past/Present/Future). |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|