Sciweavers

278 search results - page 11 / 56
» On the Security of RSA Padding
Sort
View
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
13 years 9 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 7 months ago
A Directed Signature Scheme Based on RSA Assumption
A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signe...
Rongxing Lu, Zhenfu Cao
CCS
2006
ACM
13 years 11 months ago
Improving secure server performance by re-balancing SSL/TLS handshakes
Much of today's distributed computing takes place in a client/server model. Despite advances in fault tolerance
Claude Castelluccia, Einar Mykletun, Gene Tsudik
TIFS
2010
186views more  TIFS 2010»
13 years 5 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
PKC
2005
Springer
192views Cryptology» more  PKC 2005»
14 years 1 months ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw