The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RSA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1984 (25) 1985-1986 (23) 1987-1988 (24) 1989 (15) 1990 (18) 1991-1992 (24) 1993-1994 (19) 1995-1996 (37) 1997 (37) 1998 (53) 1999 (63) 2000 (68) 2001 (104) 2002 (115) 2003 (141) 2004 (154) 2005 (192) 2006 (193) 2007 (152) 2008 (171) 2009 (160) 2010 (104) 2011 (83) 2012 (101) 2013 (95) 2014 (99) 2015 (96) 2016 (105) 2017 (99) 2018 (101) 2019 (107) 2020 (105) 2021 (98) 2022 (96) 2023 (94) 2024 (40)
Publication types (Num. hits)
article(917) book(4) data(4) incollection(23) inproceedings(2234) phdthesis(5) proceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2125 occurrences of 681 keywords

Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Colin D. Walter Data Integrity in Hardware for Modular Arithmetic. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF checker circuit, fault tolerance, testing, cryptography, data integrity, RSA, Computer arithmetic, correctness, error correction, soft errors, Montgomery multiplication, modular multiplication, modular exponentiation
28Adi Shamir, Nicko van Someren Playing "Hide and Seek" with Stored Keys. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA
28Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
28Rosario Gennaro, Shai Halevi, Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Hash and Sign, Smooth Numbers, Digital Signatures, RSA, Random Oracle, Chameleon Hashing
28Adam L. Young, Moti Yung Kleptography: Using Cryptography Against Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log
28Stephen R. Dussé, Burton S. Kaliski Jr. A Cryptographic Library for the Motorola DSP56000. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Encryption hardware, Message digest, Montgomery reduction, Motorola DSP56000, RSA, Data Encryption Standard (DES), Modular arithmetic, Multiple-precision arithmetic
28Dominique de Waleffe, Jean-Jacques Quisquater CORSAIR: A SMART Card for Public Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF public key algorithms, digital signature, Smart card, RSA, zero-knowledge protocols
27Andrej Dujella A variant of Wiener's attack on RSA. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) Primary: 94A60, Secondary: 11A55, 11J70
27Peter Lory Reducing the Complexity in the Distributed Computation of Private RSA Keys. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Julien Cathalo, David Naccache, Jean-Jacques Quisquater Comparing with RSA. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh Chosen-message SPA attacks against FPGA-based RSA hardware implementations. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Alexander May 0001, Maike Ritzenhofen Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chinese Remaindering, Coppersmith’s method, Håstad’s attack, systems of univariate modular polynomials
27Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin Threshold RSA for Dynamic and Ad-Hoc Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh Enhanced power analysis attack using chosen message against RSA hardware implementations. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Subhamoy Maitra, Santanu Sarkar 0001 A New Class of Weak Encryption Exponents in RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Lattice, Factorization, LLL Algorithm
27Jean-Sébastien Coron, Alexander May 0001 Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Willi Geiselmann, Rainer Steinwandt Special-Purpose Hardware in Cryptanalysis: The Case of 1, 024-Bit RSA. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas A bit-sliced, scalable and unified montgomery multiplier architecture for RSA and ECC. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Fengying Li, Qingshui Xue, Zhenfu Cao Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Chong Hee Kim, Jean-Jacques Quisquater Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Bogdan Groza An Extension of the RSA Trapdoor in a KEM/DEM Framework. Search on Bibsonomy SYNASC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Igor E. Shparlinski On RSA Moduli with Prescribed Bit Patterns. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 11N25, 11T23, 11T71
27Xue-mi Zhao, Zhiying Wang 0003, Hongyi Lu, Kui Dai A 6.35Mbps 1024-bit RSA crypto coprocessor in a 0.18um CMOS technology. Search on Bibsonomy VLSI-SoC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Eric Brier, Benoît Chevallier-Mames, Mathieu Ciet, Christophe Clavier Why One Should Also Secure RSA Public Key Elements. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette Power Attack on Small RSA Public Exponent. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Luo Jianwen An Efficient Algorithm for DPA-resistent RSA. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee A Traitor Tracing Scheme Based on RSA for Fast Decryption. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Ivan Damgård, Kasper Dupont Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Damien Vergnaud RSA-Based Secret Handshakes. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Brian King An Efficient Implementation of a Threshold RSA Signature Scheme. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague GBD Threshold Cryptography with an Application to RSA Key Recovery. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Apostolos P. Fournaris, Odysseas G. Koufopavlou A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jiali Cao, Zheng-an Yao An Improved RSA-Based Access Control Scheme for Hierarchical Groups. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Martin Seysen Using an RSA Accelerator for Modular Inversion. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Smart card coprocessor, Euclidean algorithm, modular inversion
27Ping Dong, Xiangdong Shi, Jiehui Yang Design of a New Kind of Encryption Kernel Based on RSA Algorithm. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Ruishan Zhang, Kefei Chen An Efficient Asynchronous Proactive RSA Scheme. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Johannes Blömer, Alexander May 0001 A Generalized Wiener Attack on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Verifiably Committed Signatures, Optimistic Fair Exchange, GPS Signature, Cryptanalysis
27Yongbin Zhou, Zhenfeng Zhang, Sihan Qing, Juan Liu A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Jin-Hua Hong, Cheng-Wen Wu Cellular-array modular multiplier for fast RSA public-key cryptosystem based on modified Booth's algorithm. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Kei Kawauchi, Mitsuru Tada On the Extract Security of Multi-signature Schemes Based on RSA. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Xunhua Yuan, Terry M. Peters, Robert B. Bourne, David W. Holdsworth Exploring RSA Ultimate Accuracy by Using Computer Synthetic Images. Search on Bibsonomy MICCAI (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa Attacking RSA-Based Sessions in SSL/TLS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27M. Jason Hinek, Mo King Low, Edlyn Teske On Some Attacks on Multi-prime RSA. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Roman Novak SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Arjen K. Lenstra, Igor E. Shparlinski Selective Forgery of RSA Signatures with Fixed-Pattern Padding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Lejla Batina, Geeke Muurling Another Way of Doing RSA Cryptography in Hardware. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation
27Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan Password-Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Dan Boneh, Antoine Joux, Phong Q. Nguyen Why Textbook ElGamal and RSA Encryption Are Insecure. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Jean-Sébastien Coron, François Koeune, David Naccache From Fixed-Length to Arbitrary-Length RSA Padding Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman J. J. te Riele, Karen I. Aardal, Jeff Gilchrist, Gérard Guillerm, Paul C. Leyland, Joël Marchand, François Morain, Alec Muffett, Chris Putnam, Craig Putnam, Paul Zimmermann Factorization of a 512-Bit RSA Modulus. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Ronald Cramer, Victor Shoup Signature Schemes Based on the Strong RSA Assumption. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Siguna Müller On the Security of an RSA Based Encryption Scheme. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Dan Boneh, Glenn Durfee Cryptanalysis of RSA with Private Key d Less than N0.292. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Jyh-Huei Guo, Chin-Liang Wang, Hung-Chih Hu Design and implementation of an RSA public-key cryptosystem. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Jen-Shiun Chiang, Jian-Kao Chen An efficient VLSI architecture for RSA public-key cryptosystem. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Johan Håstad, Mats Näslund The Security of Individual RSA Bits. Search on Bibsonomy FOCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Guillaume Poupard, Jacques Stern Generation of Shared RSA Keys by Two Parties. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Dan Boneh, Glenn Durfee, Yair Frankel An Attack on RSA Given a Small Fraction of the Private Key Bits. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Marc Girault, Jean-François Misarsky Selective Forgery of RSA Signatures Using Redundancy. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter Low-Exponent RSA with Related Messages. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
27Ronald Cramer, Ivan Damgård New Generation of Secure and Practical RSA-Based Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
27Philippe Béguin, Jean-Jacques Quisquater Fast Server-Aided RSA Signatures Secure Against Active Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
27Kaoru Kurosawa, Koji Okada, Shigeo Tsujii Low Exponent Attack against Elliptic Curve RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
27Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, Mark S. Manasse On the Factorization of RSA-120. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
27Birgit Pfitzmann, Michael Waidner Attacks on Protocols for Server-Aided RSA Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
27Chih-Chwen Chuang, James George Dunham Matrix Extensions of the RSA Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
27Michael J. Wiener Cryptanalysis of Short RSA Secret Exponents (Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
27Ernest F. Brickell A Survey of Hardware Implementation of RSA (Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
27Johan Håstad On Using RSA with Low Exponent in a Public Key Network. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
27Claus-Peter Schnorr, Werner Alexi RSA-Bits are 0.5 + epsilon Secure. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
27A. Ecker Finite Semigroups and the RSA-Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
27Yi Mu 0001, Willy Susilo, Huafei Zhu Compact sequential aggregate signatures. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA problem, communication, computer, provably secure, signatures
27He Ge, Stephen R. Tate Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption
27Ryotaro Hayashi 0001, Keisuke Tanaka Universally Anonymizable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy
27Emil Ong, John Kubiatowicz Optimizing Robustness While Generating Shared Secret Safe Primes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed key generation, safe primes, threshold RSA signatures
27Shuhong Wang 0001, Feng Bao 0001, Robert H. Deng Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable security, Forward security, Blind signature, Strong RSA assumption
27Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Proof of equality of discrete logarithms (PEQDL), Threshold decryption, Threshold ElGamal, Threshold RSA, Batch verification
27Yasuyuki Sakai, Kouichi Sakurai A New Attack with Side Channel Leakage During Exponent Recoding Computations. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems
27Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
27Marc Joye, Pascal Paillier GCD-Free Algorithms for Computing Modular Inverses. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA key generation, GCD algorithms, embedded software, efficient implementations, prime numbers, Modular inverses
27Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption
27Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes
26Elena Trichina, Roman Korkikyan Multi Fault Laser Attacks on Protected CRT-RSA. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cortex M3, RSA, Chinese Remainder Theorem, Fault Attacks, laser
26Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani, Ruggero Susella Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, RSA, side channel attacks, DPA, power analysis attack
26Ya-Fen Chang, Yen-Cheng Lai, Mu-Yen Chen Further Remarks on Identity-Based RSA Multi-signature. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity-based signature (IBS), digital signature, RSA, public key cryptography, multi- signature
26Ersin Öksüzoglu, Erkay Savas Parametric, Secure and Compact Implementation of RSA on FPGA. Search on Bibsonomy ReConFig The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, RSA, Public key cryptography
26Johannes Merkle Multi-round passive attacks on server-aided RSA protocols. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF server aided secret computations, digital signatures, RSA, knapsack problem
26B. J. Phillips, N. Burgess Implementing 1, 024-Bit RSA Exponentiation on a 32-Bit Processor Core. Search on Bibsonomy ASAP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Smart Card, RSA, Public Key Cryptography, Sliding Windows, Modular Exponentiation
25Krishnan Shankar RSA+: An algorithm at least as secure as RSA. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Sietse Ringers Using the RSA or RSA-B accumulator in anonymous credential schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
25Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Guillaume Barbu FA-LLLing for RSA: Lattice-based Fault Attacks against RSA Encryption and Signature. Search on Bibsonomy FDTC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Joy Halder, Tamaghna Acharya, Monish Chatterjee, Uma Bhattacharya E-S-RSM-RSA: A Novel Energy and Spectrum Efficient Regenerator Aware Multipath Based Survivable RSA in Offline EON. Search on Bibsonomy IEEE Trans. Green Commun. Netw. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
25Jiankuo Dong, Guang Fan, Fangyu Zheng, Jingqiang Lin, Fu Xiao 0001 TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2. Search on Bibsonomy WASA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 3211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license