军事学 >>> 军事学
搜索结果: 121-135 共查到军事学 RSA相关记录163条 . 查询时间(0.109 秒)
To distribute the signing power and make the system more secure and robust, threshold signature is employed. To tolerate a more powerful, mobile adversary, proactive secret sharing should be adopted...
We address one of the most fundamental problems concern- ing the RSA cryptosystem: does the knowledge of the RSA public and secret key-pair (e, d) yield the factorization of N = pq in polynomial ti...
This note describes an SPA-based side channel attack against a CRT implementation of an RSA function. In contrast with Novak’s attack [8], it concentrates on the initial modular reduction. With the h...
In this paper, we present a new parallel architecture to avoid side-channel analyses such as: timing attack, simple/differential power analysis, fault induction attack and simple/differential electr...
This paper analyzes a key recovery method for RSA signature gener- ation or decryption implementations using the Chinese Remainder The- orem (CRT) speed up. The CRT-based RSA implementation is commo...
GNFS (general number field sieve) algorithm is currently the fastest known algorithm for factoring large integers. Up to the present, several running time estimates for GNFS are announced (ex. [LV00...
In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, bu...
We investigate eÆcient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authenticated key excha...
Seifert recently described a new fault attack against an implementation of RSA signature verification.Here we give a simplified analysis of Seifert’s attack and gauge its practicality against RSA modu...
An efficient variant of RSA cryptosystem was proposed by Cesar [2]. He called it Rprime RSA. The Rprime RSA is a combination of Mprime RSA [3] and Rebalanced RSA [9, 1]. Although the decryption spee...
If factoring is hard, this paper shows that straight line programs cannot efficiently solve the low public exponent RSA problem. More precisely, no efficient algorithm can take an RSA public key as ...
In this paper we propose a variant of RSA public key scheme, called “Hidden Exponent RSA”. Based on this new scheme, we devised an efficient key distribution/management scheme for secure communicati...
In this paper, for given N = pq with p and q different odd primes, and m = 1; 2; ¢ ¢ ¢ ; we give a public key cryptosystem. When m = 1 the system is just the famous RSA system. And wh...
Twin RSA     Twin RSA  cryptography       2009/2/13
Twin RSA.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...