军事学 >>> 军事学
搜索结果: 106-120 共查到军事学 RSA相关记录163条 . 查询时间(0.14 秒)
密钥托管密码体制不仅能保护用户的隐私权,同时允许法律授权下的监听。本文提出了在网络环境中基于RSA算法的一种密钥托管体制。系统中有一可信中心,为每一用户指定n个委托人,每一委托人为网络中一服务器。可信中心按(t,n)门限方案为n个委托人分配恢复用户密钥的部分能力。用户在系统中广播自己经过加密的密钥时,仅当至少有t个委托人联合起来才能实施对用户的监听。
可公开验证加密允许任何实体验证加密的消息和先前承诺的秘密一样,但不会泄漏明文的任何信息。这在公平交换、防欺骗的秘密分享和安全多方计算中有重要应用。该文分别给出可公开验证的ElGamal加密和RSA加密方案。其中前者是Stalderr方案的改进,改进后的方案是语义安全的而Stalder方案达不到语义安全性。同时将该方案推广到了多个接受者的情形,最后给出了高效的可公开验证RSA加密方案。
本文研究了组成RSA模数的两个素数p和q其低位比特相同,RSA公开密钥密码系统的安全性。其结果表明若RSA模数的两个素因子p和q共享低位比特,则当私钥d较小时这样的体制相对于模数不平衡的RSA更易受到攻击。本文的研究结果表明,当组成RSA模数的两个素数p和q仅有少量比特不相同时,使用规模较小的私钥d必须十分慎重。
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OAEP cannot be proven...
In a two-party RSA signature scheme, a client and server, each holding a share of an RSA decryption exponent d, collaborate to compute an RSA signature under the corresponding public key N; e known ...
Fully Distributed Threshold RSA under Standard Assumptions.
We introduce a new class of computational problems which we call the “one-more-RSAinversion” problems. Our main result is that two problems in this class, which we call the chosen-target and known-t...
We present extremely simple ways of embedding a backdoor in the key generation scheme of RSA. Three of our schemes generate two genuinely random primes p and q of a given size, to obtain their publ...
We propose an elliptic curve scheme over the ring Zn2 , which is efficient and semantically secure in the standard model, and it has expansion factor 2 (previous schemes with similar features presen...
This article describes concrete results and practically approved countermeasures concerning di erential fault attacks on RSA using the CRT. It especially investigates smartcards with a RSA coprocess...
This paper contains three parts. In the first part we present a new side channel attack on plaintext encrypted by EME-OAEP PKCS#1 v.2.1. In contrast with Manger´s attack, we attack that part o...
We discuss a modification of the Cramer-Shoup strong-RSA signature scheme. Our proposal also presumes the strong RSA assumption (and a collision-intractable hash function for long messages), but |w...
We describe an efficient combination of two variants of RSA cryptosystem (MPrime and Rebalanced RSA) analysed by Boneh and Schacham [2]. The decryption process resultant is (for 2048-bits moduli) a...
In this paper we present a practically feasible attack on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding method for the RSA encryption of a premast...
An algorithm to obtain an RSA modulus with a large private key.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...