메뉴 건너뛰기




Volumn 11, Issue 5, 1993, Pages 778-784

Fast Server-Aided Secret Computation Protocols for Modular Exponentiation

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 0027617773     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/49.223880     Document Type: Article
Times cited : (55)

References (19)
  • 1
    • 84941466410 scopus 로고
    • Smart cards can compute secret heavy functions with powerful terminals
    • Enoshima-Island, Japan, Nov.
    • T. Matsumoto, K. Kato, and H. Iami, “Smart cards can compute secret heavy functions with powerful terminals” (In Japanese), in Proc. 10th Symp. Inform. Theory Appl., Enoshima-Island, Japan, Nov. 1987, pp. 17–22.
    • (1987) (In Japanese), in Proc. 10th Symp. Inform. Theory Appl , pp. 17-22
    • Matsumoto, T.1    Kato, K.2    Iami, H.3
  • 3
    • 85034638281 scopus 로고
    • Encrypting problem instances, or…, Can you take advantage of someone without having to trust him?
    • New York: Springer-Verlag
    • J. Feigenbaum, “Encrypting problem instances, or …, Can you take advantage of someone without having to trust him?” in Advances in Cryptology—CRYPTO’85, Lecture Notes in Computer Science, 219. New York: Springer-Verlag, 1986, 477–488.
    • (1986) Advances in Cryptology—CRYPTO’85, Lecture Notes in Computer Science, 219 , pp. 477-488
    • Feigenbaum, J.1
  • 8
    • 0005063381 scopus 로고    scopus 로고
    • Speeding up smart card RSA computation with insure coprocessors
    • Amsterdam, North-Holland, Oct.
    • J.J. Quisquater and M. De Soete, “Speeding up smart card RSA computation with insure coprocessors,” in Proc. SMART CARD 2000, Amsterdam, North-Holland, Oct. 1989, pp. 191–197.
    • (2000) Proc. SMART CARD 2000 , pp. 191-197
    • Quisquater, J.J.1    DeSoete, M.2
  • 9
    • 0346395014 scopus 로고
    • On the evaluation of powers
    • A. C. Yao, “On the evaluation of powers,” SIAM J. Comput., vol. 5, no. 1, pp. 100–103, 1976.
    • (1976) SIAM J. Comput , vol.5 , Issue.1 , pp. 100-103
    • Yao, A.C.1
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, pp. 120–126, 1978.
    • (1978) Commun. ACM , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 13
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Inform. Theory, vol. IT-22, pp. 644–645, 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-645
    • Diffie, W.1    Hellman, M.E.2
  • 14
    • 84941445853 scopus 로고
    • Seminumerical Algorithms, 2nd ed. Reading, MA
    • D. E. Knuth, The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, 2nd ed. Reading, MA, 1981, 451.
    • (1981) The Art of Computer Programming , vol.2 , pp. 451
    • Knuth, D.E.1
  • 15
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • New York:
    • A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” in Advances in Cryptology—CRYPTO’86, Lecture Notes in Computer Science, vol. 263. New York: 1987, 186–194.
    • (1987) Advances in Cryptology–CRYPTO'86, Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 16
    • 33746255697 scopus 로고
    • Performance analysis of server-aided secret computation protocols for the RSA cryptosystem
    • S. Kawamura and A. Shimbo, “Performance analysis of server-aided secret computation protocols for the RSA cryptosystem,” Trans. IEICE Japan, vol. E73, no. 7, pp. 1073–1080, 1990.
    • (1990) Trans. IEICE Japan , vol.E73 , Issue.7 , pp. 1073-1080
    • Kawamura, S.1    Shimbo, A.2
  • 17
    • 0025471436 scopus 로고
    • A factorization attack on certain server-aided computation protocols for the RSA secret transformation
    • Aug.
    • A. Shimbo and S. Kawamura, “A factorization attack on certain server-aided computation protocols for the RSA secret transformation,” Electron. Len., vol. 26, no. 17, pp. 1387-1388, Aug. 1990.
    • (1990) Electron. Len , vol.26 , Issue.17 , pp. 1387-1388
    • Shimbo, A.1    Kawamura, S.2
  • 19
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • Oct.
    • J.J. Quisquater and C. Couvreuer, “Fast decipherment algorithm for RSA public-key cryptosystem,” Electron. Lett., vol. 18, no. 21, pp. 905–907, Oct. 1982.
    • (1982) Electron. Lett , vol.18 , Issue.21 , pp. 905-907
    • Quisquater, J.J.1    Couvreuer, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.