Sciweavers

257 search results - page 6 / 52
» On the Security of RSA Screening
Sort
View
CRYPTO
1999
Springer
66views Cryptology» more  CRYPTO 1999»
15 years 9 months ago
On the Security of RSA Padding
Jean-Sébastien Coron, David Naccache, Julie...
176
Voted
ASIACRYPT
2004
Springer
15 years 10 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
15 years 10 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...
156
Voted
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 11 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
15 years 5 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...