The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RSA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1984 (25) 1985-1986 (23) 1987-1988 (24) 1989 (15) 1990 (18) 1991-1992 (24) 1993-1994 (19) 1995-1996 (37) 1997 (37) 1998 (53) 1999 (63) 2000 (68) 2001 (104) 2002 (115) 2003 (141) 2004 (154) 2005 (192) 2006 (193) 2007 (152) 2008 (171) 2009 (160) 2010 (104) 2011 (83) 2012 (101) 2013 (95) 2014 (99) 2015 (96) 2016 (105) 2017 (99) 2018 (101) 2019 (107) 2020 (105) 2021 (98) 2022 (96) 2023 (94) 2024 (40)
Publication types (Num. hits)
article(917) book(4) data(4) incollection(23) inproceedings(2234) phdthesis(5) proceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2125 occurrences of 681 keywords

Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
40Johann Großschädl High-Speed RSA Hardware Based on Barret's Modular Reduction Method. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic
40Eric R. Verheul, Henk C. A. van Tilborg Cryptanalysis of 'Less Short' RSA Secret Exponents. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RSA system, Cryptanalysis, Continued fractions
39Maged Hamada Ibrahim Verifiable Threshold Sharing of a Large Secret Safe-Prime. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS
39Constantinos Patsakis, Evangellos Fountas Creating RSA Trapdoors Using Lagrange Four Square Theorem. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA cheating, RSA, public key cryptography, number theory, sum of squares, Integer factorization
36Francis M. Crowe, Alan Daly, William P. Marnane A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Qianxiang Wang, Gang Huang 0001, Junrong Shen, Hong Mei 0001, Fuqing Yang Runtime Software Architecture Based Software Online Evolution. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Runtime Software Architecture, Online Evolution
36Yevgeniy Dodis, Leonid Reyzin On the Power of Claw-Free Permutations. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Colin Boyd A New Multiple Key Cipher and an Improved Voting Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
35Colin D. Walter Montgomery's Multiplication Technique: How to Make It Smaller and Faster. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF higher radix methods, checker function, fault tolerance, testing, cryptography, RSA, Computer arithmetic, systolic arrays, error correction, differential power analysis, DPA, Montgomery modular multiplication
34Pei-Yih Ting, Xiao-Wei Huang An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold proxy signature, Cryptography, Proxy signature
34Alexandre Berzati, Cécile Canovas, Louis Goubin In(security) Against Fault Injection Attacks for CRT-RSA Implementations. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Varad Kirtane, C. Pandu Rangan RSA-TBOS signcryption with proxy re-encryption. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signcryption, proxy re-encryption
34Keklik Alptekin Bayam, Siddika Berna Örs Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Adi Shamir RSA-Past, Present, Future. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Zhengjun Cao, Lihua Liu A Strong RSA Signature Scheme and Its Application. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Jaechun No, Chang Won Park, Sung-Soon Park 0001 A Replication Software Architecture(RSA) for Supporting Irregular Applications on Wide-Area Distributed Computing Environments. Search on Bibsonomy ISPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Chingwei Yeh, En-Feng Hsu, Kai-Wen Cheng, Jinn-Shyan Wang, Nai-Jen Chang An 830mW, 586kbps 1024-bit RSA chip design. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Allen Michalski, Duncan A. Buell A Scalable Architecture for RSA Cryptography on Large FPGAs. Search on Bibsonomy FPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Ambrose Chu, Mihai Sima Reconfigurable RSA Cryptography for Embedded Devices. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Shuhua Wu, Yuefei Zhu, Qiong Pu Resource Efficient Hardware Design for RSA. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Taisya Krivoruchko, James Diamond, Jeff Hooper Storing RSA Private Keys In Your Head. Search on Bibsonomy PRDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Jin-Hua Hong, Bin-Yan Tsai A Fast Bit-Interleaving RSA Cryptosystem Based on Radix-4 Cellular-Array Modular Multiplier. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Arjen K. Lenstra, Benjamin M. M. de Weger Twin RSA. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Julien Cathalo, Jean-Sébastien Coron, David Naccache From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Matthias Ernst, Ellen Jochemsz, Alexander May 0001, Benne de Weger Partial Key Exposure Attacks on RSA up to Full Size Exponents. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Zhenfeng Zhang, Dengguo Feng Efficient Fair Certified E-Mail Delivery Based on RSA. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Shaohua Tang Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Ryotaro Hayashi 0001, Tatsuaki Okamoto, Keisuke Tanaka An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vipul Gupta, Leonard Rarick, Shreyas Sundaram A Public-Key Cryptographic Processor for RSA and ECC. Search on Bibsonomy ASAP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
34Christian Cachin An asynchronous protocol for distributed computation of RSA inverses and its applications. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF verifiable random functions, Cryptography, Byzantine agreement, threshold signatures, verifiable secret sharing
34Ari Juels, Jorge Guajardo RSA Key Generation with Verifiable Randomness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation
34Kouichi Sakurai, Tsuyoshi Takagi New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Ivan Damgård, Maciej Koprowski Practical Threshold RSA Signatures without a Trusted Dealer. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
34Taek Won Kwon, Chang-Seok You, Won-Seok Heo, Yong-Kyu Kang, Jun Rim Choi Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm. Search on Bibsonomy ISCAS (4) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Dan Boneh Simplified OAEP for the RSA and Rabin Functions. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou Threshold Undeniable RSA Signature Scheme. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Glenn Durfee, Phong Q. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Dan Boneh, Nagendra Modadugu, Michael Kim Generating RSA Keys on a Handheld Using an Untrusted Server. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Christophe Coupé, Phong Q. Nguyen, Jacques Stern The Effectiveness of Lattice Attacks Against Low-Exponent RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
34Phong Q. Nguyen, Jacques Stern The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Jean-François Misarsky How (not) to Design RSA Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Tsuyoshi Takagi Fast RSA-Type Cryptosystems Using N-Adic Expansion. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
34Chae Hoon Lim, Pil Joong Lee Security and Performance of Server-Aided RSA Computation Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
34Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai High-Speed Implementation Methods for RSA Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
34Klaus Huber Some Considerations concerning the Selection of RSA Moduli. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
34Gordon Rankine THOMAS - A Complete Single Chip RSA Device. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
34Shimon Even, Oded Goldreich 0001, Adi Shamir On the Security of Ping-Pong Protocols when Implemented using the RSA. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
34Cristian Coarfa, Peter Druschel, Dan S. Wallach Performance analysis of TLS Web servers. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA accelerator, secure Web servers, Internet, e-commerce, TLS
34Wontae Hwang, Dongseung Kim Load Balanced Block Lanczos Algorithm over GF(2) for Factorization of Large Keys. Search on Bibsonomy HiPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF parallel/cluster computing, RSA key, load balancing, sparse matrix, cryptology
34Ilya Mironov Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance
34He Ge An Efficient Key Management Scheme for Pervasive Computing. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF pervasive computing, key management, key exchange, strong RSA assumption
34Colin D. Walter Faster Modular Multiplication by Operand Scaling. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Fast Computer Arithmetic, Digital Arithmetic Methods, RSA Algorithm, Cryptography, Modular Multiplication
33Markus Rückert Verifiably Encrypted Signatures from RSA without NIZKs. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online contract signing, RSA, Merkle hash trees
33Frédéric Amiel, Benoit Feix On the BRIP Algorithms Security for RSA. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks
33Abderrahmane Nitaj Another Generalization of Wiener's Attack on RSA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Coppersmith’s method, Smooth numbers, Cryptanalysis, RSA, ECM
33Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF the Wiener attack, most significant bit, RSA, exhaustive-searching, continued fraction
33Peter T. Antonov, Valentina R. Antonova Development of the attack against RSA with low public exponent and related messages. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low public exponent attack, related messages, RSA
33Colin D. Walter Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, SPA, Side channel leakage
33Shi Cui, Choong Wah Chan, Xiangguo Cheng Practical Group Signatures from RSA. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security mediator, digital signature, RSA, group signature
33David A. Wagner 0001 Cryptanalysis of a provably secure CRT-RSA algorithm. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, chinese remainder theorem, fault attacks
33Benne de Weger Cryptanalysis of RSA with Small Prime Difference. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Fermat Factoring, Wiener Attack, Boneh-Durfee Attack, Cryptanalysis, RSA
33Kiamal Z. Pekmestzi, Nikos K. Moshopoulos A Systolic, High Speed Architecture for an RSA Cryptosystem. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Montgomery algorithm, modular squaring, RSA, public key cryptography, modular multiplication
33Alan Daly, William P. Marnane Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic. Search on Bibsonomy FPGA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF FPGA, encryption, RSA, public key, exponentiation, modular multiplication, montgomery
33Chi-Sung Laih, Fu-Kuan Tu Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Server aided secret computation (SASC), passive attacks, RSA, Signature, active attacks
32Thomas Finke, Max Gebhardt, Werner Schindler A New Side-Channel Attack on RSA Prime Generation. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA prime generation, Side-channel attack, key generation
32Ping Yu 0006, Stephen R. Tate An Online/Offline Signature Scheme Based on the Strong RSA Assumption. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption
32Ying Yang, Zine-Eddine Abid, Wei Wang 0003 Two-prime RSA immune cryptosystem and its FPGA implementation. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA cryptography, hardware faulty attack, immunity analysis, FPGA
32Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold proxy signature, RSA cryptosystem, Lagrange interpolating polynomial
32Werner Schindler, Colin D. Walter More Detail for a Combined Timing and Power Attack against Implementations of RSA. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication
32Colin D. Walter Moduli for Testing Implementations of the RSA Cryptosystem. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1999 DBLP  DOI  BibTeX  RDF RSA modulus, implementation validation benchmark, verification, testing, cryptography, Computer arithmetic, correctness
32Markus Michels, Markus Stadler, Hung-Min Sun On the Security of Some Variants of the RSA Signature Scheme. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RSA variants, cryptanalysis, digital signature schemes
29Jingzhou Li, Günther Ruhe Analysis of attribute weighting heuristics for analogy-based software effort estimation method AQUA+. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Effort estimation by analogy, Attribute weighting, Rough set analysis, Learning, Feature selection, Heuristics
29Takanori Komatsu, Shoichiro Ohtsuka, Kazuhiro Ueda, Takashi Komeda Comprehension of Users' Subjective Interaction States During Their Interaction with an Artificial Agent by Means of Heart Rate Variability Index. Search on Bibsonomy ACII The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Huafei Zhu, Feng Bao 0001, Robert H. Deng Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme
29Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish Versatile padding schemes for joint signature and encryption. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption
29Adi Shamir, Eran Tromer Factoring Large Number with the TWIRL Device. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval Key-Privacy in Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Jean-Sébastien Coron On the Exact Security of Full Domain Hash. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Yair Frankel, Moti Yung Cryptanalysis of the Immunized LL Public Key Systems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
29Chi-Sung Laih, Sung-Ming Yen, Lein Harn Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
28Owen Harrison, John Waldron Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA, Public-Key Cryptography, Residue Number System, Graphics Processor
28Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv
28JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha A new fault cryptanalysis on montgomery ladder exponentiation algorithm. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis
28Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume A Black Hen Lays White Eggs. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF double-size technique, RSA, smartcard, Montgomery multiplication, efficient implementation
28Robert Szerwinski, Tim Güneysu Exploiting the Power of GPUs for Asymmetric Cryptography. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Asymmetric Cryptosystems, Graphics Processing Unit, RSA, ECC, DSA
28M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas New and Improved Architectures for Montgomery Modular Multiplication. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reconfigurable multiplier, scalable multiplier, RSA, ECC, carry save adders, Montgomery modular multiplication
28Camille Vuillaume, Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fractional width, RSA, side channel attacks, simple power analysis
28Kaoru Kurosawa, Tsuyoshi Takagi New Approach for Selectively Convertible Undeniable Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF selective conversion, RSA, undeniable signature
28Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation
28Haifeng Qian, Zhenfu Cao A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, provably secure, random oracle model, proxy signature, identity-based signature
28Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao A server assisted authentication protocol for detecting error vectors. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF server assisted, cryptography, cryptanalysis, RSA
28Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Montgomery’s Multiplication Method, FPGA, RSA, ECC, Public Key Cryptography, systolic array
28Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka A Practical Countermeasure against Address-Bit Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure
28James Heather, Steve A. Schneider Equal To The Task? Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces
28Joy Algesheimer, Jan Camenisch, Victor Shoup Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF safe primes, distributed primality test, RSA, threshold cryptography
28Thomas Blum, Christof Paar High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2001 DBLP  DOI  BibTeX  RDF FPGA, RSA, systolic array, exponentiation, modular arithmetic, Montgomery
28Colin D. Walter Sliding Windows Succumbs to Big Mac Attack. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation
Displaying result #801 - #900 of 3211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license