The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RSA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1984 (25) 1985-1986 (23) 1987-1988 (24) 1989 (15) 1990 (18) 1991-1992 (23) 1993-1994 (19) 1995-1996 (37) 1997 (35) 1998 (52) 1999 (63) 2000 (67) 2001 (103) 2002 (113) 2003 (138) 2004 (153) 2005 (192) 2006 (193) 2007 (152) 2008 (171) 2009 (160) 2010 (101) 2011 (82) 2012 (100) 2013 (93) 2014 (98) 2015 (92) 2016 (100) 2017 (89) 2018 (87) 2019 (45)
Publication types (Num. hits)
article(662) book(4) incollection(23) inproceedings(1952) phdthesis(3) proceedings(19)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2125 occurrences of 681 keywords

Results
Found 2663 publication records. Showing 2663 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
144Hung-Min Sun, Cheng-Ta Yang RSA with Balanced Short Exponents and Its Application to Entity Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication
141Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 On the Improvement of the BDF Attack on LSBS-RSA. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB)
123Alexandra Boldyreva Strengthening Security of RSA-OAEP. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
115Ron Steinfeld, Yuliang Zheng An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
104Xuhua Ding, Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mediated RSA, revocation, Identity-based encryption
102Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo 0001, Huaxiong Wang Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LSBS-RSA, short exponent attack, lattice reduction technique, the Boneh-Durfee attack, RSA, least significant bits (LSBs)
99Pascal Paillier Impossibility Proofs for RSA Signatures in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
97Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
97Jan-Hendrik Evertse, Eugène van Heyst Which New RSA Signatures Can Be Computed From Some Given RSA Signatures? Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF RSA scheme, cryptographic protocol, RSA signature
96Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson RSA-Based Undeniable Signatures for General Moduli. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA-based Undeniable Signatures, Undeniable Signatures
96Ron Steinfeld, Yuliang Zheng On the Security of RSA with Primes Sharing Least-Significant Bits. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits
96Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
88Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
88Jakob Jonsson, Matthew J. B. Robshaw Securing RSA-KEM via the AES. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA-KEM, key derivation function, AES
88Pierre-Alain Fouque, Jacques Stern Fully Distributed Threshold RSA under Standard Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold RSA key generation and signature
84Matthieu Rivain Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
83Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, M. Jason Hinek Dual RSA and Its Security Analysis. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
81Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF “Left-To-Right” exponentiation, RSA, fault attacks, number theory
81Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa Small Secret Key Attack on a Variant of RSA (Due to Takagi). Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trivariate polynomial, RSA, lattice, LLL
81Onur Aciiçmez, Werner Schindler A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication
81Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design
81Shay Gueron, Jean-Pierre Seifert Is It Wise to Publish Your Public RSA Keys? Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks
81Daniel Bleichenbacher, Alexander May 0001 New Attacks on RSA with Small Secret CRT-Exponents. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, RSA, lattices
81Dario Catalano, Phong Q. Nguyen, Jacques Stern The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key
80Colin D. Walter Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptography, differential power analysis, DPA, RSA cryptosystem, Montgomery modular multiplication
78Tal Rabin A Simplified Approach to Threshold and Proactive RSA. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF proactive signatures, threshold and proactive RSA, RSA, threshold signatures
77Adam L. Young, Moti Yung A Key Recovery System as Secure as Factoring. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Rabin, Blum integer, pseudosquare, PKCS #1, standard compatibility, RSA, public key cryptography, zero-knowledge, chosen ciphertext security, key recovery, semantic Security, quadratic residue
77Steven D. Galbraith, Wenbo Mao Invisibility and Anonymity of Undeniable and Confirmer Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility
76Xun Yi Directed Transitive Signature Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Directed transitive signature, transitive closure and reduction, RSA inversion problem over a cyclic group
76M. Jason Hinek Another Look at Small RSA Exponents. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
73Colin D. Walter Seeing through MIST Given a Small Fraction of an RSA Private Key. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA
73Geneviève Arboit, Jean-Marc Robert 0001 From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF padding scheme, atomic primitive, hash-and-sign, division intractability, smooth numbers, Digital signature, RSA, provable security
73Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
73Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert A new CRT-RSA algorithm secure against bellcore attacks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack
73Wieland Fischer, Jean-Pierre Seifert Note on Fast Computation of Secret RSA Exponents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation
73Johannes Merkle, Ralph Werchner On the Security of Server-Aided RSA Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF server-aided secret computation, RSA, signature, generic algorithms
73Dan Boneh, Ramarathnam Venkatesan Breaking RSA May Not Be Equivalent to Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Algebraic circuits, RSA, Factoring, Straight line programs
72David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks
72Jan-Hendrik Evertse, Eugène van Heyst Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
71Emmanuel Bresson, Jean Monnerat, Damien Vergnaud Separation Results on the "One-More" Computational Problems. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF “One-more” problems, Random self-reducible problems, Algebraic algorithms, Black-box reductions
71Benoît Chevallier-Mames, Marc Joye A Practical and Tightly Secure Signature Scheme Without Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
70Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
70Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF Blind digital signature schemes, RSA, digital cash
69Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
69Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
69Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
68Colin D. Walter, Susan Thompson Distinguishing Exponent Digits by Observing Modular Subtractions. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF m-ary method, power analysis, sliding windows, Exponentiation, Montgomery multiplication, modular multiplication, timing attack, RSA cryptosystem
68Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
68John Malone-Lee, Wenbo Mao Two Birds One Stone: Signcryption Using RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
68Claude Crépeau, Alain Slakmon Simple Backdoors for RSA Key Generation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
68Stanislaw Jarecki, Josh Olsen Proactive RSA with Non-interactive Signing. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Muxiang Zhang New Approaches to Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung Proactive RSA. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
68Rosario Gennaro, Hugo Krawczyk, Tal Rabin RSA-Based Undeniable Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
65E. Dongna, Qingfeng Cheng, Chuangui Ma Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-Residue Attack, RSA, Password Authenticated Key Exchange
65Subhamoy Maitra, Santanu Sarkar 0001 Revisiting Wiener's Attack - New Weak Keys in RSA. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Factorization, Weak Keys
65Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh A Fast RSA Implementation on Itanium 2 Processor. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ita- 2, RSA, Montgomery multiplication, software implementation
65Ping Li, Lalin Jiang, Jiaying Wu, Jing Zhang RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Extended-modulus computation, RSA, fair exchange, VRES
65Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems
64Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar An Efficient RSA Public Key Encryption Scheme. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA public encryption scheme, square matrices, general linear group, digital signature scheme
64James A. Muir Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature verification, fault analysis, RSA signatures, hardware faults
63Hovav Shacham, Dan Boneh Improving SSL Handshake Performance via Batching. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
63Jacques Patarin, Nicolas Courtois, Louis Goubin QUARTZ, 128-Bit Long Digital Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
62Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern RSA-OAEP Is Secure under the RSA Assumption. Search on Bibsonomy J. Cryptology The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, Provable security, Public-key encryption, OAEP
60Ping Yu 0006, Stephen R. Tate Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online/Offline Signing, Devices with Limited Computing Capabilities, Digital Signature, Standard Model, Strong RSA Assumption
60Claude Castelluccia, Einar Mykletun, Gene Tsudik Improving secure server performance by re-balancing SSL/TLS handshakes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF server-aided RSA, server-aided secure computation, load-balancing, denial-of-service, hardware accelerators, client puzzles
60Adi Shamir RSA Shortcuts. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
60Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Yi Wang 0016, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
60Yonghong Yang, Zine Abid, Wei Wang 0003, Z. Zhang, C. Yang Efficient multi-prime RSA immune against hardware fault attack. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen An Efficient Decryption Method for RSA Cryptosystem. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Stanislaw Jarecki, Nitesh Saxena Further Simplifications in Proactive RSA Signatures. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Robust and Efficient Sharing of RSA Functions. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
60Amos Fiat Batch RSA. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
58Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
57Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF selective/all conversion, RSA, standard model, undeniable signature
57Baodong Qin, Ming Li, Fanyu Kong Cryptanalysis of a Type of CRT-Based RSA Algorithms. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL
57Sining Liu, Brian King, Wei Wang 0003 A CRT-RSA Algorithm Secure against Hardware Fault Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF algorithm, smart card, RSA, Chinese Remainder Theorem
57Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder
57Jean-Pierre Seifert On authenticated computing and RSA-based authentication. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authenticated computing, RSA, fault attacks, secure boot
57Chi-Sung Laih, K. Y. Chen Generating visible RSA public keys for PKI. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public key generation, RSA, Certificate, Integer factorization
57Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
56Tianjie Cao, Xianping Mao, Dongdai Lin Security Analysis of a Server-Aided RSA Key Generation Protocol. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Server-aided RSA key generation, Handheld device, Collusion attack
56Gregor Leander, Andy Rupp On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computational Equivalence, RSA Problem, Factorization Problem, Generic Algorithms
56Ellen Jochemsz, Alexander May 0001 A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small roots, Coppersmith’s method, RSA variants, cryptanalysis, lattices
56Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen Server-Aided RSA Key Generation Against Collusion Attack. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA crypto-system, server-aided key generation, Information security, collusion attack, hand-held device
56Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
56Ingrid Biehl, Tsuyoshi Takagi A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Distributed RSA, quadratic fields, parallel computation, primality test
56Jakob Jonsson, Burton S. Kaliski Jr. On the Security of RSA Encryption in TLS. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key encapsulation, RSA encryption, TLS
56Tsuyoshi Takagi Fast RSA-Type Cryptosystem Modulo pkq. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm
56Wieland Fischer, Jean-Pierre Seifert High-Speed Modular Multiplication. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Sedlaks algorithm, Computer arithmetic, Modular multiplication, Implementation issues, Booth recoding
56Benoît Chevallier-Mames Self-Randomized Exponentiation Algorithms. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Nicolas Courtois The Security of Hidden Field Equations (HFE). Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
56Tatsuaki Okamoto, David Pointcheval REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
55Michael J. Beller, Yacov Yacobi Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
53Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF low-end device, double-size technique, RSA, modular multiplication, efficient implementation, crypto-coprocessors, arithmetic unit
52Oded Goldreich 0001 On the Number of Close-and-Equal Pairs of Bits in a String. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF the RSA Scheme, Bit Security, Combinatorial Bounds, Bit-String Properties, Cryptography, Public Key Cryptosystems, Combinatorial Analysis
52Atsushi Takayasu, Noboru Kunihiro A Tool Kit for Partial Key Exposure Attacks on RSA. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
52Noboru Kunihiro, Yuki Takahashi Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2663 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license