Sciweavers

69 search results - page 4 / 14
» rsa 2008
Sort
View
100
Voted
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
15 years 5 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
113
Voted
AFRICACRYPT
2008
Springer
15 years 10 months ago
Another Generalization of Wiener's Attack on RSA
Abderrahmane Nitaj
85
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 3 months ago
A variant of Wiener's attack on RSA
Andrej Dujella
IJNSEC
2008
166views more  IJNSEC 2008»
15 years 3 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
147
Voted
RSA
2008
89views more  RSA 2008»
15 years 3 months ago
Simple permutations mix even better
We study the random composition of a small family of O(n3 ) simple permutations on {0, 1}n . Specifically we ask how many randomly selected simple permutations need be composed to...
Alex Brodsky, Shlomo Hoory