The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for rsa with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1984 (25) 1985-1986 (23) 1987-1988 (24) 1989 (15) 1990 (18) 1991-1992 (24) 1993-1994 (19) 1995-1996 (37) 1997 (37) 1998 (53) 1999 (63) 2000 (68) 2001 (104) 2002 (115) 2003 (141) 2004 (154) 2005 (192) 2006 (193) 2007 (152) 2008 (171) 2009 (160) 2010 (104) 2011 (83) 2012 (101) 2013 (95) 2014 (99) 2015 (96) 2016 (105) 2017 (99) 2018 (101) 2019 (107) 2020 (105) 2021 (98) 2022 (96) 2023 (94) 2024 (40)
Publication types (Num. hits)
article(917) book(4) data(4) incollection(23) inproceedings(2234) phdthesis(5) proceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2125 occurrences of 681 keywords

Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
134Hung-Min Sun, Cheng-Ta Yang RSA with Balanced Short Exponents and Its Application to Entity Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication
133Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 On the Improvement of the BDF Attack on LSBS-RSA. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB)
119Alexandra Boldyreva Strengthening Security of RSA-OAEP. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
112Ron Steinfeld, Yuliang Zheng 0001 An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
103Xuhua Ding, Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mediated RSA, revocation, Identity-based encryption
97Pascal Paillier Impossibility Proofs for RSA Signatures in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
96Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo 0001, Huaxiong Wang Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LSBS-RSA, short exponent attack, lattice reduction technique, the Boneh-Durfee attack, RSA, least significant bits (LSBs)
95Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson RSA-Based Undeniable Signatures for General Moduli. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA-based Undeniable Signatures, Undeniable Signatures
94Jan-Hendrik Evertse, Eugène van Heyst Which New RSA Signatures Can Be Computed From Some Given RSA Signatures? Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF RSA scheme, cryptographic protocol, RSA signature
94Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
90Ron Steinfeld, Yuliang Zheng 0001 On the Security of RSA with Primes Sharing Least-Significant Bits. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits
90Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
83Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
83Jakob Jonsson, Matthew J. B. Robshaw Securing RSA-KEM via the AES. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA-KEM, key derivation function, AES
83Pierre-Alain Fouque, Jacques Stern Fully Distributed Threshold RSA under Standard Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold RSA key generation and signature
83Matthieu Rivain Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
82Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF “Left-To-Right” exponentiation, RSA, fault attacks, number theory
82Onur Aciiçmez, Werner Schindler A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication
82Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa Small Secret Key Attack on a Variant of RSA (Due to Takagi). Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trivariate polynomial, RSA, lattice, LLL
82Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design
81Colin D. Walter Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptography, differential power analysis, DPA, RSA cryptosystem, Montgomery modular multiplication
78Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, M. Jason Hinek Dual RSA and Its Security Analysis. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
77Daniel Bleichenbacher, Alexander May 0001 New Attacks on RSA with Small Secret CRT-Exponents. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, RSA, lattices
77Shay Gueron, Jean-Pierre Seifert Is It Wise to Publish Your Public RSA Keys? Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks
77Dario Catalano, Phong Q. Nguyen, Jacques Stern The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key
77Adam L. Young, Moti Yung A Key Recovery System as Secure as Factoring. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Rabin, Blum integer, pseudosquare, PKCS #1, standard compatibility, RSA, public key cryptography, zero-knowledge, chosen ciphertext security, key recovery, semantic Security, quadratic residue
77Steven D. Galbraith, Wenbo Mao Invisibility and Anonymity of Undeniable and Confirmer Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility
76M. Jason Hinek Another Look at Small RSA Exponents. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
76Xun Yi Directed Transitive Signature Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Directed transitive signature, transitive closure and reduction, RSA inversion problem over a cyclic group
75Tal Rabin A Simplified Approach to Threshold and Proactive RSA. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF proactive signatures, threshold and proactive RSA, RSA, threshold signatures
75Colin D. Walter Seeing through MIST Given a Small Fraction of an RSA Private Key. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA
75Geneviève Arboit, Jean-Marc Robert 0001 From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF padding scheme, atomic primitive, hash-and-sign, division intractability, smooth numbers, Digital signature, RSA, provable security
70Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Emmanuel Bresson, Jean Monnerat, Damien Vergnaud Separation Results on the "One-More" Computational Problems. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF “One-more” problems, Random self-reducible problems, Algebraic algorithms, Black-box reductions
70Benoît Chevallier-Mames, Marc Joye A Practical and Tightly Secure Signature Scheme Without Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
69Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
69Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert A new CRT-RSA algorithm secure against bellcore attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack
69Wieland Fischer, Jean-Pierre Seifert Note on Fast Computation of Secret RSA Exponents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation
69Johannes Merkle, Ralph Werchner On the Security of Server-Aided RSA Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF server-aided secret computation, RSA, signature, generic algorithms
69Dan Boneh, Ramarathnam Venkatesan Breaking RSA May Not Be Equivalent to Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Algebraic circuits, RSA, Factoring, Straight line programs
69Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
69Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
69Jan-Hendrik Evertse, Eugène van Heyst Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
68David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks
68John Malone-Lee, Wenbo Mao Two Birds One Stone: Signcryption Using RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
68Claude Crépeau, Alain Slakmon Simple Backdoors for RSA Key Generation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
68Colin D. Walter, Susan Thompson Distinguishing Exponent Digits by Observing Modular Subtractions. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF m-ary method, power analysis, sliding windows, Exponentiation, Montgomery multiplication, modular multiplication, timing attack, RSA cryptosystem
68Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF Blind digital signature schemes, RSA, digital cash
68Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
67Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
63Stanislaw Jarecki, Josh Olsen Proactive RSA with Non-interactive Signing. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Muxiang Zhang New Approaches to Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
63Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung Proactive RSA. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
63Rosario Gennaro, Hugo Krawczyk, Tal Rabin RSA-Based Undeniable Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
63Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
63Hovav Shacham, Dan Boneh Improving SSL Handshake Performance via Batching. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
63Jacques Patarin, Nicolas T. Courtois, Louis Goubin QUARTZ, 128-Bit Long Digital Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
62E. Dongna, Qingfeng Cheng, Chuangui Ma Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-Residue Attack, RSA, Password Authenticated Key Exchange
62Subhamoy Maitra, Santanu Sarkar 0001 Revisiting Wiener's Attack - New Weak Keys in RSA. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Factorization, Weak Keys
62Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh A Fast RSA Implementation on Itanium 2 Processor. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ita- 2, RSA, Montgomery multiplication, software implementation
62Ping Li 0034, Lalin Jiang, Jiaying Wu, Jing Zhang RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Extended-modulus computation, RSA, fair exchange, VRES
62Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems
61Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar An Efficient RSA Public Key Encryption Scheme. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA public encryption scheme, square matrices, general linear group, digital signature scheme
61James A. Muir Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature verification, fault analysis, RSA signatures, hardware faults
61Adi Shamir RSA Shortcuts. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
61Ping Yu 0006, Stephen R. Tate Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online/Offline Signing, Devices with Limited Computing Capabilities, Digital Signature, Standard Model, Strong RSA Assumption
61Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern RSA-OAEP Is Secure under the RSA Assumption. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, Provable security, Public-key encryption, OAEP
56Fanyu Kong, Jia Yu 0003, Baodong Qin, Daxing Li Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
56Yi Wang 0016, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Stanislaw Jarecki, Nitesh Saxena Further Simplifications in Proactive RSA Signatures. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Yonghong Yang, Zine Abid, Wei Wang 0003, Z. Zhang, C. Yang Efficient multi-prime RSA immune against hardware fault attack. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen An Efficient Decryption Method for RSA Cryptosystem. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Robust and Efficient Sharing of RSA Functions. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
56Amos Fiat Batch RSA. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
56Claude Castelluccia, Einar Mykletun, Gene Tsudik Improving secure server performance by re-balancing SSL/TLS handshakes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF server-aided RSA, server-aided secure computation, load-balancing, denial-of-service, hardware accelerators, client puzzles
56Benoît Chevallier-Mames Self-Randomized Exponentiation Algorithms. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Wieland Fischer, Jean-Pierre Seifert High-Speed Modular Multiplication. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Sedlaks algorithm, Computer arithmetic, Modular multiplication, Implementation issues, Booth recoding
56Nicolas T. Courtois The Security of Hidden Field Equations (HFE). Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
56Tatsuaki Okamoto, David Pointcheval REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
55Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF selective/all conversion, RSA, standard model, undeniable signature
55Baodong Qin, Ming Li, Fanyu Kong Cryptanalysis of a Type of CRT-Based RSA Algorithms. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL
55Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder
55Sining Liu, Brian King, Wei Wang 0003 A CRT-RSA Algorithm Secure against Hardware Fault Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF algorithm, smart card, RSA, Chinese Remainder Theorem
55Jean-Pierre Seifert On authenticated computing and RSA-based authentication. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authenticated computing, RSA, fault attacks, secure boot
55Chi-Sung Laih, K. Y. Chen Generating visible RSA public keys for PKI. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public key generation, RSA, Certificate, Integer factorization
55Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
55Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
55Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF low-end device, double-size technique, RSA, modular multiplication, efficient implementation, crypto-coprocessors, arithmetic unit
54Ellen Jochemsz, Alexander May 0001 A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small roots, Coppersmith’s method, RSA variants, cryptanalysis, lattices
54Gregor Leander, Andy Rupp On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computational Equivalence, RSA Problem, Factorization Problem, Generic Algorithms
54Tianjie Cao, Xianping Mao, Dongdai Lin Security Analysis of a Server-Aided RSA Key Generation Protocol. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Server-aided RSA key generation, Handheld device, Collusion attack
54Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen Server-Aided RSA Key Generation Against Collusion Attack. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA crypto-system, server-aided key generation, Information security, collusion attack, hand-held device
54Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
54Ingrid Biehl, Tsuyoshi Takagi A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Distributed RSA, quadratic fields, parallel computation, primality test
54Jakob Jonsson, Burton S. Kaliski Jr. On the Security of RSA Encryption in TLS. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key encapsulation, RSA encryption, TLS
54Tsuyoshi Takagi Fast RSA-Type Cryptosystem Modulo pkq. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm
54Guillaume Barbu, Christophe Giraud 0001 All Shall FA-LLL: Breaking CT-RSA 2022 and CHES 2022 Infective Countermeasures with Lattice-Based Fault Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
54Mike Hamburg, Mike Tunstall, Qinglai Xiao Improvements to RSA Key Generation and CRT on Embedded Devices. Search on Bibsonomy CT-RSA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
54Atsushi Takayasu, Noboru Kunihiro A Tool Kit for Partial Key Exposure Attacks on RSA. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
54Noboru Kunihiro, Yuki Takahashi Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3211 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license