International audiencePublic-key cryptographic primitives are time-consuming for resource-constrained devices. A classical problem is to securely offload group exponentiations from a (comparatively) weak device-the client-to an untrusted more powerful device-the server. A delegation protocol must usually meet two security objectives: privacy-the exponent or the base should not be revealed to a passive adversary-and verifiability-a malicious server should not be able to make the client accept an invalid value as the result of the delegated computation. Most proposed protocols relies on a secret splitting of the exponent and the base and a considerable amount of literature has been devoted to their analysis. Recently, Su, Zhang and Xue [The C...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
© 2018 IEEE. Nowadays, cloud computing is increasingly popular. As its important application, outsou...
Group exponentiation is an important operation used in many cryptographic protocols, specifically pu...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
International audienceWe address the problem of speeding up group computations in cryptography using...
Abstract. Modular exponentiations have been considered the most ex-pensive operation in discrete-log...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
Abstract—With the rapid development of cloud services, the techniques for securely outsourcing the p...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
2018, Springer Science+Business Media, LLC, part of Springer Nature. Modular exponentiation is an ex...
© 2018 Elsevier Ltd Outsourcing computing allows users with resource-constrained devices to outsourc...
Abstract. Being required in many applications, modular exponentia-tions form the most expensive part...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Abstract. We consider RSA-type schemes with modulus N = p r q for r ≥ 2. We present two new attacks ...
Long version available as Christian-Albrecht Universität IFI-Report 0305, Kiel (Germany)We present a...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
© 2018 IEEE. Nowadays, cloud computing is increasingly popular. As its important application, outsou...
Group exponentiation is an important operation used in many cryptographic protocols, specifically pu...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
International audienceWe address the problem of speeding up group computations in cryptography using...
Abstract. Modular exponentiations have been considered the most ex-pensive operation in discrete-log...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
Abstract—With the rapid development of cloud services, the techniques for securely outsourcing the p...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
2018, Springer Science+Business Media, LLC, part of Springer Nature. Modular exponentiation is an ex...
© 2018 Elsevier Ltd Outsourcing computing allows users with resource-constrained devices to outsourc...
Abstract. Being required in many applications, modular exponentia-tions form the most expensive part...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Abstract. We consider RSA-type schemes with modulus N = p r q for r ≥ 2. We present two new attacks ...
Long version available as Christian-Albrecht Universität IFI-Report 0305, Kiel (Germany)We present a...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
© 2018 IEEE. Nowadays, cloud computing is increasingly popular. As its important application, outsou...
Group exponentiation is an important operation used in many cryptographic protocols, specifically pu...