|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2125 occurrences of 681 keywords
|
|
|
Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
40 | Johann Großschädl |
High-Speed RSA Hardware Based on Barret's Modular Reduction Method. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic |
40 | Eric R. Verheul, Henk C. A. van Tilborg |
Cryptanalysis of 'Less Short' RSA Secret Exponents. |
Appl. Algebra Eng. Commun. Comput. |
1997 |
DBLP DOI BibTeX RDF |
RSA system, Cryptanalysis, Continued fractions |
39 | Maged Hamada Ibrahim |
Verifiable Threshold Sharing of a Large Secret Safe-Prime. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS |
39 | Constantinos Patsakis, Evangellos Fountas |
Creating RSA Trapdoors Using Lagrange Four Square Theorem. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
RSA cheating, RSA, public key cryptography, number theory, sum of squares, Integer factorization |
36 | Francis M. Crowe, Alan Daly, William P. Marnane |
A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Qianxiang Wang, Gang Huang 0001, Junrong Shen, Hong Mei 0001, Fuqing Yang |
Runtime Software Architecture Based Software Online Evolution. |
COMPSAC |
2003 |
DBLP DOI BibTeX RDF |
Runtime Software Architecture, Online Evolution |
36 | Yevgeniy Dodis, Leonid Reyzin |
On the Power of Claw-Free Permutations. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Colin Boyd |
A New Multiple Key Cipher and an Improved Voting Scheme. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
35 | Colin D. Walter |
Montgomery's Multiplication Technique: How to Make It Smaller and Faster. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
higher radix methods, checker function, fault tolerance, testing, cryptography, RSA, Computer arithmetic, systolic arrays, error correction, differential power analysis, DPA, Montgomery modular multiplication |
34 | Pei-Yih Ting, Xiao-Wei Huang |
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Threshold proxy signature, Cryptography, Proxy signature |
34 | Alexandre Berzati, Cécile Canovas, Louis Goubin |
In(security) Against Fault Injection Attacks for CRT-RSA Implementations. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS signcryption with proxy re-encryption. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
signcryption, proxy re-encryption |
34 | Keklik Alptekin Bayam, Siddika Berna Örs |
Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Adi Shamir |
RSA-Past, Present, Future. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Zhengjun Cao, Lihua Liu |
A Strong RSA Signature Scheme and Its Application. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Jaechun No, Chang Won Park, Sung-Soon Park 0001 |
A Replication Software Architecture(RSA) for Supporting Irregular Applications on Wide-Area Distributed Computing Environments. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Chingwei Yeh, En-Feng Hsu, Kai-Wen Cheng, Jinn-Shyan Wang, Nai-Jen Chang |
An 830mW, 586kbps 1024-bit RSA chip design. |
DATE Designers' Forum |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Allen Michalski, Duncan A. Buell |
A Scalable Architecture for RSA Cryptography on Large FPGAs. |
FPL |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Ambrose Chu, Mihai Sima |
Reconfigurable RSA Cryptography for Embedded Devices. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Shuhua Wu, Yuefei Zhu, Qiong Pu |
Resource Efficient Hardware Design for RSA. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Taisya Krivoruchko, James Diamond, Jeff Hooper |
Storing RSA Private Keys In Your Head. |
PRDC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Jin-Hua Hong, Bin-Yan Tsai |
A Fast Bit-Interleaving RSA Cryptosystem Based on Radix-4 Cellular-Array Modular Multiplier. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Arjen K. Lenstra, Benjamin M. M. de Weger |
Twin RSA. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Julien Cathalo, Jean-Sébastien Coron, David Naccache |
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Matthias Ernst, Ellen Jochemsz, Alexander May 0001, Benne de Weger |
Partial Key Exposure Attacks on RSA up to Full Size Exponents. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Zhenfeng Zhang, Dengguo Feng |
Efficient Fair Certified E-Mail Delivery Based on RSA. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Shaohua Tang |
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Ryotaro Hayashi 0001, Tatsuaki Okamoto, Keisuke Tanaka |
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vipul Gupta, Leonard Rarick, Shreyas Sundaram |
A Public-Key Cryptographic Processor for RSA and ECC. |
ASAP |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
34 | Christian Cachin |
An asynchronous protocol for distributed computation of RSA inverses and its applications. |
PODC |
2003 |
DBLP DOI BibTeX RDF |
verifiable random functions, Cryptography, Byzantine agreement, threshold signatures, verifiable secret sharing |
34 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
34 | Kouichi Sakurai, Tsuyoshi Takagi |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Ivan Damgård, Maciej Koprowski |
Practical Threshold RSA Signatures without a Trusted Dealer. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
34 | Taek Won Kwon, Chang-Seok You, Won-Seok Heo, Yong-Kyu Kang, Jun Rim Choi |
Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm. |
ISCAS (4) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda |
A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Dan Boneh |
Simplified OAEP for the RSA and Rabin Functions. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou |
Threshold Undeniable RSA Signature Scheme. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Glenn Durfee, Phong Q. Nguyen |
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Dan Boneh, Nagendra Modadugu, Michael Kim |
Generating RSA Keys on a Handheld Using an Untrusted Server. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Christophe Coupé, Phong Q. Nguyen, Jacques Stern |
The Effectiveness of Lattice Attacks Against Low-Exponent RSA. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Phong Q. Nguyen, Jacques Stern |
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Jean-François Misarsky |
How (not) to Design RSA Signature Schemes. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Tsuyoshi Takagi |
Fast RSA-Type Cryptosystems Using N-Adic Expansion. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Chae Hoon Lim, Pil Joong Lee |
Security and Performance of Server-Aided RSA Computation Protocols. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai |
High-Speed Implementation Methods for RSA Scheme. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
34 | Klaus Huber |
Some Considerations concerning the Selection of RSA Moduli. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
34 | Gordon Rankine |
THOMAS - A Complete Single Chip RSA Device. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
34 | Shimon Even, Oded Goldreich 0001, Adi Shamir |
On the Security of Ping-Pong Protocols when Implemented using the RSA. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
34 | Cristian Coarfa, Peter Druschel, Dan S. Wallach |
Performance analysis of TLS Web servers. |
ACM Trans. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
RSA accelerator, secure Web servers, Internet, e-commerce, TLS |
34 | Wontae Hwang, Dongseung Kim |
Load Balanced Block Lanczos Algorithm over GF(2) for Factorization of Large Keys. |
HiPC |
2006 |
DBLP DOI BibTeX RDF |
parallel/cluster computing, RSA key, load balancing, sparse matrix, cryptology |
34 | Ilya Mironov |
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance |
34 | He Ge |
An Efficient Key Management Scheme for Pervasive Computing. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
pervasive computing, key management, key exchange, strong RSA assumption |
34 | Colin D. Walter |
Faster Modular Multiplication by Operand Scaling. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
Fast Computer Arithmetic, Digital Arithmetic Methods, RSA Algorithm, Cryptography, Modular Multiplication |
33 | Markus Rückert |
Verifiably Encrypted Signatures from RSA without NIZKs. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Online contract signing, RSA, Merkle hash trees |
33 | Frédéric Amiel, Benoit Feix |
On the BRIP Algorithms Security for RSA. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks |
33 | Abderrahmane Nitaj |
Another Generalization of Wiener's Attack on RSA. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Coppersmith’s method, Smooth numbers, Cryptanalysis, RSA, ECM |
33 | Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen |
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
the Wiener attack, most significant bit, RSA, exhaustive-searching, continued fraction |
33 | Peter T. Antonov, Valentina R. Antonova |
Development of the attack against RSA with low public exponent and related messages. |
CompSysTech |
2007 |
DBLP DOI BibTeX RDF |
low public exponent attack, related messages, RSA |
33 | Colin D. Walter |
Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, SPA, Side channel leakage |
33 | Shi Cui, Choong Wah Chan, Xiangguo Cheng |
Practical Group Signatures from RSA. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
security mediator, digital signature, RSA, group signature |
33 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
33 | Benne de Weger |
Cryptanalysis of RSA with Small Prime Difference. |
Appl. Algebra Eng. Commun. Comput. |
2002 |
DBLP DOI BibTeX RDF |
Fermat Factoring, Wiener Attack, Boneh-Durfee Attack, Cryptanalysis, RSA |
33 | Kiamal Z. Pekmestzi, Nikos K. Moshopoulos |
A Systolic, High Speed Architecture for an RSA Cryptosystem. |
J. VLSI Signal Process. |
2002 |
DBLP DOI BibTeX RDF |
Montgomery algorithm, modular squaring, RSA, public key cryptography, modular multiplication |
33 | Alan Daly, William P. Marnane |
Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic. |
FPGA |
2002 |
DBLP DOI BibTeX RDF |
FPGA, encryption, RSA, public key, exponentiation, modular multiplication, montgomery |
33 | Chi-Sung Laih, Fu-Kuan Tu |
Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Server aided secret computation (SASC), passive attacks, RSA, Signature, active attacks |
32 | Thomas Finke, Max Gebhardt, Werner Schindler |
A New Side-Channel Attack on RSA Prime Generation. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
RSA prime generation, Side-channel attack, key generation |
32 | Ping Yu 0006, Stephen R. Tate |
An Online/Offline Signature Scheme Based on the Strong RSA Assumption. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption |
32 | Ying Yang, Zine-Eddine Abid, Wei Wang 0003 |
Two-prime RSA immune cryptosystem and its FPGA implementation. |
ACM Great Lakes Symposium on VLSI |
2005 |
DBLP DOI BibTeX RDF |
RSA cryptography, hardware faulty attack, immunity analysis, FPGA |
32 | Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin |
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
threshold proxy signature, RSA cryptosystem, Lagrange interpolating polynomial |
32 | Werner Schindler, Colin D. Walter |
More Detail for a Combined Timing and Power Attack against Implementations of RSA. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication |
32 | Colin D. Walter |
Moduli for Testing Implementations of the RSA Cryptosystem. |
IEEE Symposium on Computer Arithmetic |
1999 |
DBLP DOI BibTeX RDF |
RSA modulus, implementation validation benchmark, verification, testing, cryptography, Computer arithmetic, correctness |
32 | Markus Michels, Markus Stadler, Hung-Min Sun |
On the Security of Some Variants of the RSA Signature Scheme. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
RSA variants, cryptanalysis, digital signature schemes |
29 | Jingzhou Li, Günther Ruhe |
Analysis of attribute weighting heuristics for analogy-based software effort estimation method AQUA+. |
Empir. Softw. Eng. |
2008 |
DBLP DOI BibTeX RDF |
Effort estimation by analogy, Attribute weighting, Rough set analysis, Learning, Feature selection, Heuristics |
29 | Takanori Komatsu, Shoichiro Ohtsuka, Kazuhiro Ueda, Takashi Komeda |
Comprehension of Users' Subjective Interaction States During Their Interaction with an Artificial Agent by Means of Heart Rate Variability Index. |
ACII |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme |
29 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
29 | Adi Shamir, Eran Tromer |
Factoring Large Number with the TWIRL Device. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
Key-Privacy in Public-Key Encryption. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Jean-Sébastien Coron |
On the Exact Security of Full Domain Hash. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Yair Frankel, Moti Yung |
Cryptanalysis of the Immunized LL Public Key Systems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
29 | Chi-Sung Laih, Sung-Ming Yen, Lein Harn |
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
28 | Owen Harrison, John Waldron |
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
RSA, Public-Key Cryptography, Residue Number System, Graphics Processor |
28 | Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv |
28 | JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha |
A new fault cryptanalysis on montgomery ladder exponentiation algorithm. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis |
28 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
A Black Hen Lays White Eggs. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
double-size technique, RSA, smartcard, Montgomery multiplication, efficient implementation |
28 | Robert Szerwinski, Tim Güneysu |
Exploiting the Power of GPUs for Asymmetric Cryptography. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Asymmetric Cryptosystems, Graphics Processing Unit, RSA, ECC, DSA |
28 | M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas |
New and Improved Architectures for Montgomery Modular Multiplication. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
reconfigurable multiplier, scalable multiplier, RSA, ECC, carry save adders, Montgomery modular multiplication |
28 | Camille Vuillaume, Katsuyuki Okeya |
Flexible Exponentiation with Resistance to Side Channel Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
fractional width, RSA, side channel attacks, simple power analysis |
28 | Kaoru Kurosawa, Tsuyoshi Takagi |
New Approach for Selectively Convertible Undeniable Signature Schemes. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
selective conversion, RSA, undeniable signature |
28 | Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. |
ARC |
2006 |
DBLP DOI BibTeX RDF |
RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation |
28 | Haifeng Qian, Zhenfu Cao |
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
RSA, provably secure, random oracle model, proxy signature, identity-based signature |
28 | Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao |
A server assisted authentication protocol for detecting error vectors. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
server assisted, cryptography, cryptanalysis, RSA |
28 | Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle |
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
Montgomery’s Multiplication Method, FPGA, RSA, ECC, Public Key Cryptography, systolic array |
28 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-Bit Differential Power Analysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure |
28 | James Heather, Steve A. Schneider |
Equal To The Task? |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces |
28 | Joy Algesheimer, Jan Camenisch, Victor Shoup |
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
safe primes, distributed primality test, RSA, threshold cryptography |
28 | Thomas Blum, Christof Paar |
High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware. |
IEEE Trans. Computers |
2001 |
DBLP DOI BibTeX RDF |
FPGA, RSA, systolic array, exponentiation, modular arithmetic, Montgomery |
28 | Colin D. Walter |
Sliding Windows Succumbs to Big Mac Attack. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation |
|
|