[[abstract]]For the dependent protocols to perform the server-aided RSA secret computation, the damage caused by the active attacks is greater than that by the passive attacks. Though there are two dependent proposed protocols against active attacks, the cost of the two protocols is still high. In this paper, we propose two efficient dependent protocols. Even considering the low cost of these two protocols, they can also guard against the proposed active attacks.[[incitationindex]]EI[[booktype]]紙
Abstract. Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and...
This paper contains an exposition on the RSA cryptosystem and some of the most common mathematical a...
“The original publication is available at www.springerlink.com”. Copyright Springer.Sometimes two pa...
[[abstract]]In this paper, we propose a new secure serveraided RSA secret computation protocol which...
Small units like chip cards have the possibility of computing, storing and protecting data. Today su...
. Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the comput...
Abstract — SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow...
International audienceWe analyze the security and the efficiency of interactive protocols where a cl...
The security, complexity, and application of two schemes for using an untrusted auxiliary processor ...
In the analysis of many cryptographic protocols, it is useful to distinguish two classes of attacks:...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
. Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and further...
Abstract: RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public...
Abstract—Nowadays, Side Channel Attacks allow an attacker to recover secrets stored in embedded devi...
RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital ...
Abstract. Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and...
This paper contains an exposition on the RSA cryptosystem and some of the most common mathematical a...
“The original publication is available at www.springerlink.com”. Copyright Springer.Sometimes two pa...
[[abstract]]In this paper, we propose a new secure serveraided RSA secret computation protocol which...
Small units like chip cards have the possibility of computing, storing and protecting data. Today su...
. Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the comput...
Abstract — SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow...
International audienceWe analyze the security and the efficiency of interactive protocols where a cl...
The security, complexity, and application of two schemes for using an untrusted auxiliary processor ...
In the analysis of many cryptographic protocols, it is useful to distinguish two classes of attacks:...
We present a new robust proactive (and threshold) RSA signature scheme secure with the optimal thres...
. Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and further...
Abstract: RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public...
Abstract—Nowadays, Side Channel Attacks allow an attacker to recover secrets stored in embedded devi...
RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital ...
Abstract. Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and...
This paper contains an exposition on the RSA cryptosystem and some of the most common mathematical a...
“The original publication is available at www.springerlink.com”. Copyright Springer.Sometimes two pa...