메뉴 건너뛰기




Volumn 26, Issue 17, 1990, Pages 1387-1388

Factorisation attack on certain server-aided computation protocols for the rsa secret transformation

Author keywords

Digital signature; RSA cryptosystem; Server aided secret computation protocol; Smart card

Indexed keywords

CRYPTOGRAPHY; DATA PROCESSING--SECURITY OF DATA;

EID: 0025471436     PISSN: 00135194     EISSN: None     Source Type: Journal    
DOI: 10.1049/el:19900891     Document Type: Article
Times cited : (17)

References (3)
  • 1
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • Matsumoto, T., Kato, K., and Imai, H.: ‘Speeding up secret computations with insecure auxiliary devices’. Lect. Notes Coraput. Sri., 1990, 403, pp. 497–506
    • (1990) Lect. Notes Coraput. Sri. , vol.403 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 2
    • 84915421915 scopus 로고
    • Speeding up smart card RSA computations with insecure coprocessors
    • Amsterdam, 4th-6th Oct.
    • Quisquater, J.-J., and Soete, M. D.: ‘Speeding up smart card RSA computations with insecure coprocessors’. Proc. SMART CARD 2000, Amsterdam, 4th-6th Oct. 1989
    • (1989) Proc. SMART CARD 2000
    • Quisquater, J.-J.1    Soete, M.D.2
  • 3
    • 84886923171 scopus 로고
    • How to ask and verify oracles for speeding up secret computations
    • (in Japanese)
    • Matsumoto, T., and Imai, H.: ‘How to ask and verify oracles for speeding up secret computations’ (in Japanese) IEICE Technical Report (ISEC), 1989, 89, (4), pp. 21–28
    • (1989) IEICE Technical Report (ISEC) , vol.89 , Issue.4 , pp. 21-28
    • Matsumoto, T.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.