메뉴 건너뛰기




Volumn 1999-September, Issue , 1999, Pages 167-172

Remarks on parameter selection for Server-aided Secret RSA computation schemes

Author keywords

active attacks; passive attacks; RSA; Server aided secret computation (SASC); Signature

Indexed keywords

ROUTERS;

EID: 33645791396     PISSN: 01903918     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPPW.1999.800057     Document Type: Conference Paper
Times cited : (3)

References (8)
  • 1
    • 0026897713 scopus 로고
    • Attacks on server assisted authentication protocols
    • R. J. Anderson "Attacks on server assisted authentication protocols, " Electronics Letters, vol. 28. p. 1473. 1992.
    • (1992) Electronics Letters , vol.28 , pp. 1473
    • Anderson, R.J.1
  • 2
    • 0028381806 scopus 로고
    • Parameter selection for server-aided RSA computation schemes
    • Feb.
    • J. Burns and C. J. Mitchell. "Parameter selection for server-aided RSA computation schemes. " IEEE Trans. Comput., vol. 43, no. 2, pp. 163-174. Feb. 1994.
    • (1994) IEEE Trans. Comput. , vol.43 , Issue.2 , pp. 163-174
    • Burns, J.1    Mitchell, C.J.2
  • 4
    • 0027617773 scopus 로고
    • Fast sever-aided secret computation protocols for modular exponentiation
    • S. Kawamura and A. Shimbo, "Fast sever-aided secret computation protocols for modular exponentiation, " IEEE J. Sel. Areas Commun., vol. 11. no. 5, pp. 778-784, 1993.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 5
    • 0026955204 scopus 로고
    • More about the active attack on the server-aided secret computation protocol
    • C. S. Laih and S. M. Yen, "More about the active attack on the server-aided secret computation protocol, " Electronics Letters, vol. 28, no. 24, p. 2250, 1992.
    • (1992) Electronics Letters , vol.28 , Issue.24 , pp. 2250
    • Laih, C.S.1    Yen, S.M.2
  • 6
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • Springer Verlag, New York
    • T. Matsumoto, K. Kato, and H. Imai, "Speeding up Secret Computations with Insecure Auxiliary Devices, " Advances in Cryptology CRY TO'88, p. 497-506, Springer Verlag, New York, 1989.
    • (1989) Advances in Cryptology CRY TO'88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 7
    • 84955578798 scopus 로고
    • Attacks on protocols for server-aided RSA computation
    • B. Pfitzmann and M. Waidner, "Attacks on protocols for server-aided RSA computation, " EUROCRYPT'92, pp. 153-162, 1992.
    • (1992) EUROCRYPT'92 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 8
    • 0025471436 scopus 로고
    • A factorization attack on certain server-aided computation protocols for RSA secret transformation
    • A. Shimbo and S. Kawamura, "A factorization attack on certain server-aided computation protocols for RSA secret transformation, " Electronic Letter', vol. 26. no. 17, pp. 1387-1388, 1990.
    • (1990) Electronic Letter' , vol.26 , Issue.17 , pp. 1387-1388
    • Shimbo, A.1    Kawamura, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.