The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RSA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1984 (25) 1985-1986 (23) 1987-1988 (24) 1989 (15) 1990 (18) 1991-1992 (24) 1993-1994 (19) 1995-1996 (37) 1997 (37) 1998 (53) 1999 (63) 2000 (68) 2001 (104) 2002 (115) 2003 (141) 2004 (154) 2005 (192) 2006 (193) 2007 (152) 2008 (171) 2009 (160) 2010 (104) 2011 (83) 2012 (101) 2013 (95) 2014 (99) 2015 (96) 2016 (105) 2017 (99) 2018 (101) 2019 (107) 2020 (105) 2021 (98) 2022 (96) 2023 (94) 2024 (40)
Publication types (Num. hits)
article(917) book(4) data(4) incollection(23) inproceedings(2234) phdthesis(5) proceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2125 occurrences of 681 keywords

Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
41Benoît Libert, Jean-Jacques Quisquater Identity Based Undeniable Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF provable security, pairings, undeniable signatures, ID-based cryptography
41Colin D. Walter Issues of Security with the Oswald-Aigner Exponentiation Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA
41Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson Universal Re-encryption for Mixnets. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Shai Halevi, Phillip Rogaway A Parallelizable Enciphering Mode. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung A Generic Construction for Intrusion-Resilient Public-Key Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Marc Joye (eds.) Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Lu Xiao 0003, Howard M. Heys Hardware Performance Characterization of Block Cipher Structures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung Intrusion-Resilient Public-Key Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Kerckhoffs' assumption, provable security, chosen-ciphertext security
41Mihir Bellare, Bennet S. Yee Forward-Security in Private-Key Cryptography. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security
41Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte NTRUSIGN: Digital Signatures Using the NTRU Lattice. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Douglas L. Whiting, Michael J. Sabin Montgomery Prime Hashing for Message Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MAC, message authentication, Universal hash
41Guido Bertoni, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM
41Katsuyuki Okeya, Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF width-w NAF, pre-computation table, smart card, side channel attacks, Elliptic curve cryptosystem, memory constraint
41Huaxiong Wang, Josef Pieprzyk Shared Generation of Pseudo-Random Functions with Cumulative Maps. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Nigel P. Smart Access Control Using Pairing Based Cryptography. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo Fractal Merkle Tree Representation and Traversal. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, fractal, Merkle tree, Amortization
41Nicolas T. Courtois, Jacques Patarin About the XL Algorithm over GF(2). Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MQ problem, overdefined and exactly defined systems of multivariate equations, Gröbner bases, XSL attacks on AES, XL algorithm, Multivariate quadratic equations
41Thomas A. Berson Cryptography after the Bubble: How to Make an Impact on the World. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Paolo D'Arco, Douglas R. Stinson Fault Tolerant and DistributedBroadcast Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim An Analysis of Proxy Signatures: Is a Secure Channel Necessary? Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Dan Boneh, Ilya Mironov, Victor Shoup A Secure Signature Scheme from Bilinear Maps. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Kaoru Kurosawa, Tetsu Iwata TMAC: Two-Key CBC MAC. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher, provable security, CBC MAC
41Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed key generation, discrete logarithm, random oracle model, Threshold cryptography, exact security
41Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen Authenticated Data Structures for Graph and Geometric Searching. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Shouhuai Xu, Ravi S. Sandhu Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Bodo Möller Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Bart Preneel (eds.) Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Burton S. Kaliski Jr. On Hash Function Firewalls in Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
41Cheng-Fen Lu, Shiuh-Pyng Winston Shieh Secure Key-Evolving Protocols for Discrete Logarithm Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key-Evolving, Backward-Secrecy, Key Management, Forward-Secrecy
41Greg Maitland, Colin Boyd Co-operatively Formed Group Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Silvio Micali, Ronald L. Rivest Transitive Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF graphs, digital signatures, public-key cryptography, transitive closure
41John Black, Phillip Rogaway Ciphers with Arbitrary Finite Domains. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provable security, Modes of Operation, Symmetric Encryption, Ciphers
41Atsuko Miyaji, Masao Nonaka, Yoshinori Takii Known Plaintext Correlation Attack against RC5. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Lejla Batina, Geeke Muurling Montgomery in Practice: How to Do It More Efficiently in Hardware. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF scalability, performance model, systolic array, Montgomery multiplication, modular exponentiation
41Colin D. Walter MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains
41Robert Johnson, David Molnar, Dawn Xiaodong Song, David A. Wagner 0001 Homomorphic Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger An ASIC Implementation of the AES SBoxes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF standard-cell design, scalability, Very Large Scale Integration (VLSI), pipelining, Advanced Encryption Standard (AES), Application Specific Integrated Circuit (ASIC), inversion, finite field arithmetic
41Giuseppe Ateniese, Cristina Nita-Rotaru Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Masayuki Abe Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Qi Cheng 0001, Shigenori Uchiyama Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Silvio Micali, Ronald L. Rivest Micropayments Revisited. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Marc Fischlin On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41David Naccache (eds.) Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Alfred Menezes, Minghua Qu Analysis of the Weil Descent Attack of Gaudry, Hess and Smart. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Jean-Pierre Seifert Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Yacov Yacobi Improved Boneh-Shaw Content Fingerprinting. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Kris Gaj, Pawel Chodowiec Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Elena Trichina, Alexander Tiountchik Scalable Algorithm for Montgomery Multiplication and Its Implementation on the Coarse-Grain Reconfigurable Chip. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Ari Juels Targeted Advertising ... And Privacy Too. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Amir Herzberg, Yosi Mass Relying Party Credentials Framework. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Michael Brown, Darrel Hankerson, Julio César López-Hernández, Alfred Menezes Software Implementation of the NIST Elliptic Curves Over Prime Fields. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Markus Jakobsson, Susanne Wetzel Security Weaknesses in Bluetooth. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Paul Onions On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Iris Anshel, Michael Anshel, Benji Fisher, Dorian Goldfeld New Key Agreement Protocols in Braid Group Cryptography. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Detlef Hühnlein Faster Generation of NICE-Schnorr-Type Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Alexander Tiountchik, Elena Trichina Modular Exponentiation on Fine-Grained FPGA. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Philippe Golle, Ilya Mironov Uncheatable Distributed Computations. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Magic numbers, Ringers, Distributed computing
41Eyal Kushilevitz, Tal Rabin Fair e-Lotteries and e-Casinos. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Yuji Watanabe, Goichiro Hanaoka, Hideki Imai Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Markus Jakobsson, David Pointcheval, Adam L. Young Secure Mobile Gambling. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Merkle, publicly verifiable, robust, Fair, lightweight, gambling
41Marc Fischlin A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Daniel R. L. Brown, Don B. Johnson Formal Security Proofs for a Signature Scheme with Partial Message Recovery. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Marc Joye, Jean-Jacques Quisquater, Moti Yung On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Michel Abdalla, Mihir Bellare, Phillip Rogaway The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptographic standards, Diffie-Hellman key exchange, provable security, elliptic curve cryptosystems, generic model, ElGamal encryption
41Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw Analysis of SHA-1 in Encryption Mode. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Jacques Patarin, Nicolas T. Courtois, Louis Goubin FLASH, a Fast Multivariate Signature Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Michel Abdalla, Sara K. Miner, Chanathip Namprempre Forward-Secure Threshold Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF proactive cryptography, forward security, threshold cryptography, signature schemes
41David P. Jablon Password Authentication Using Multiple Servers. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Philip D. MacKenzie More Efficient Password-Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Yoshinori Aono A New Lattice Construction for Partial Key Exposure Attack for RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction
41Abderrahmane Nitaj Cryptanalysis of RSA Using the Ratio of the Primes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s Method, Cryptanalysis, RSA, Factorization, Continued Fraction
41Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier Fault Attacks on RSA Signatures with Partially Unknown Messages. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s theorem, iso/iec 9796-2, digital signatures, rsa, Fault attacks
41Martin Hlavác Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem
41Santanu Sarkar 0001, Subhamoy Maitra Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
41Alexandre Berzati, Cécile Canovas, Louis Goubin Perturbating RSA Public Keys: An Improved Attack. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA, public key, fault attacks, DFA
41David Vigilant RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software countermeasure, RSA, Chinese Remainder Theorem, Fault attacks, Modular exponentiation, Bellcore attack
41Arnaud Boscher, Robert Naciri, Emmanuel Prouff CRT RSA Algorithm Protected Against Fault Attacks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation
41Ellen Jochemsz, Alexander May 0001 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT
41Ellen Jochemsz, Benne de Weger A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction
41Wen-Chung Kuo, Ming-Yang Chen A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, Secret Sharing, Proxy Signature
41Ryotaro Hayashi 0001, Keisuke Tanaka The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF undeniable and confirmer signature, anonymity, encryption, RSA, ring signature
41Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme. Search on Bibsonomy J. Cryptol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Blind digital signature schemes, RSA, Digital cash
41Mihir Bellare, Gregory Neven Transitive Signatures Based on Factoring and RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF transitive signatures, RSA, Signatures
41Alexander May 0001 Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Coppersmith's method, small secret exponent, RSA, lattice reduction
41Dan Boneh, Matthew K. Franklin Efficient generation of shared RSA keys. Search on Bibsonomy J. ACM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF RSA, threshold cryptography, Multiparty computation, primality testing
41Yuliang Zheng 0001 Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF High Order Residues, RSA, Signature, Public Key Encryption, Signcryption
41Ronald Cramer, Victor Shoup Signature schemes based on the strong RSA assumption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF digital signatures, RSA, provable security
41Werner Schindler A Timing Attack against RSA with the Chinese Remainder Theorem. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA, Chinese Remainder Theorem, Montgomery multiplication, Timing attack
40Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Second Order, CRT-RSA, Fault Attacks, Countermeasure
40Mahabir Prasad Jhanwar, Rana Barua Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA Group, Free Group, Quadratic Residues
40Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen Simplified Threshold RSA with Adaptive and Proactive Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Threshold RSA, Uni-versal Composability, Proactiveness, Adaptive Security
40Johannes Blömer, Martin Otto 0002 Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CRT-RSA, BOS-Scheme, Wagner’s attack, smartcards, fault attacks
40Johan Håstad, Mats Näslund The security of all RSA and discrete log bits. Search on Bibsonomy J. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA-encryption, bit-security, complexity, Cryptography, discrete logarithms
40Huafei Zhu Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Committed signatures, strong RSA assumption, fair exchange protocols
40Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes 0001, Paul C. Leyland Factoring Estimates for a 1024-Bit RSA Modulus. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 1024-bit RSA, TWIRL, factorization, number field sieve
40Kaoru Kurosawa, Tsuyoshi Takagi Some RSA-Based Encryption Schemes with Tight Security Reduction. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA-Paillier, Rabin-Paillier, Factoring, semantic security, tight reduction
40Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF e-commerce, zero-knowledge proofs, multisignatures, RSA signatures, Fair-exchange protocols
Displaying result #701 - #800 of 3211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license