. Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the computing power from the server(un trusted auxiliary device like ATM) without revealing the secret information of the client. The previous approach is to decompose the client's secret information into many pieces and to reveal some of them to the server. It significantly accelerates the secret computation, however there are some problems. Firstly, many pieces that have linear relation enable an attacker to probabilistic active attack, and it causes the performance degradation of SASC protocol. Secondly, the amount of communication and the server's computation is very large and proportional to security parameters. In this paper, we investi...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Abstract. In smartcard encryption and signature applications, randomised algorithms are used to incr...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...
Abstract — SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow...
[[abstract]]In this paper, we propose a new secure serveraided RSA secret computation protocol which...
Small units like chip cards have the possibility of computing, storing and protecting data. Today su...
The security, complexity, and application of two schemes for using an untrusted auxiliary processor ...
Treats the problem how small devices such as smart cards can efficiently compute signatures, execute...
[[abstract]]For the dependent protocols to perform the server-aided RSA secret computation, the dama...
Abstract. An important shortcoming of client-side cryptography on consumer devices is the poor prote...
AbstractA lot of discussions for smart card based identification and digital signature schemes have ...
1The security of the RSA capable smart card that is widely used for secure Internet banking, Web ac-...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Public key signature schemes are necessary for the access control to communication networks and for ...
In this paper we propose a variant of RSA public key scheme, called "Hidden Exponent RSA"...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Abstract. In smartcard encryption and signature applications, randomised algorithms are used to incr...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...
Abstract — SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow...
[[abstract]]In this paper, we propose a new secure serveraided RSA secret computation protocol which...
Small units like chip cards have the possibility of computing, storing and protecting data. Today su...
The security, complexity, and application of two schemes for using an untrusted auxiliary processor ...
Treats the problem how small devices such as smart cards can efficiently compute signatures, execute...
[[abstract]]For the dependent protocols to perform the server-aided RSA secret computation, the dama...
Abstract. An important shortcoming of client-side cryptography on consumer devices is the poor prote...
AbstractA lot of discussions for smart card based identification and digital signature schemes have ...
1The security of the RSA capable smart card that is widely used for secure Internet banking, Web ac-...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Public key signature schemes are necessary for the access control to communication networks and for ...
In this paper we propose a variant of RSA public key scheme, called "Hidden Exponent RSA"...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Abstract. In smartcard encryption and signature applications, randomised algorithms are used to incr...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...