메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 26-34

Improving secure server performance by Re-balancing SSL/TLS handshakes

Author keywords

Client puzzles; Denial of service; Hardware accelerators; Load balancing; Server aided RSA; Server aided secure computation

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; MATHEMATICAL MODELS; PUBLIC KEY CRYPTOGRAPHY; RESOURCE ALLOCATION; SERVERS;

EID: 34247378261     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128826     Document Type: Conference Paper
Times cited : (52)

References (32)
  • 1
    • 0343951569 scopus 로고
    • Speeding up Secret Computations with Insecure Auxiliary Devices
    • 88, pp
    • T. Matsumoto, K. Kato, and H. Imai, "Speeding up Secret Computations with Insecure Auxiliary Devices," Proceedings of Crypto '88, pp. 497-506, 1988.
    • (1988) Proceedings of Crypto , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 2
    • 34247368749 scopus 로고    scopus 로고
    • Private communication, Private communication with D. Wagner
    • Private communication, "Private communication with D. Wagner," 2005.
    • (2005)
  • 3
    • 34247343551 scopus 로고    scopus 로고
    • Network Working Group, RFC 2246, The TLS Protocol Version 1.0, Internet RFC/STD/FYI/BCP Archives, 1999
    • Network Working Group, "RFC 2246 - The TLS Protocol Version 1.0," Internet RFC/STD/FYI/BCP Archives, 1999, http://www.faqs.org/ rfcs/rfc2246.html.
  • 5
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 7
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA. public-key cryptosystem
    • J. Quisquater and C. Couvreur, "Fast decipherment algorithm for RSA. public-key cryptosystem," Electronic Letters, vol. 18, pp. 1905-907, 1982.
    • (1982) Electronic Letters , vol.18 , pp. 1905-1907
    • Quisquater, J.1    Couvreur, C.2
  • 9
    • 84955578798 scopus 로고
    • Attacks on Protocols for Server-Aided RSA Computations
    • 92, pp
    • B. Pfitzmann and M. Waidner, "Attacks on Protocols for Server-Aided RSA Computations," Proceedings of Eurocrypt '92, pp. 153-162, 1992.
    • (1992) Proceedings of Eurocrypt , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 10
    • 0026897713 scopus 로고
    • Attack on Server Assisted Authentication Protocols
    • R. J. Anderson, "Attack on Server Assisted Authentication Protocols," Electronic Letters, vol. 28, pp. 1473, 1992.
    • (1992) Electronic Letters , vol.28 , pp. 1473
    • Anderson, R.J.1
  • 12
    • 84957648348 scopus 로고
    • Security and performance of server-aided RSA computation protocols
    • C. H. Lim and P. J. Lee, "Security and performance of server-aided RSA computation protocols," Advances in Cryptology - CRYPTO '95, pp. 70-83, 1995.
    • (1995) Advances in Cryptology - CRYPTO '95 , pp. 70-83
    • Lim, C.H.1    Lee, P.J.2
  • 13
    • 0028381806 scopus 로고    scopus 로고
    • J. Burns and C. Mitchell, Parameter Selection for Server-Aided RSA Computation Schemes, IEEE Transactions on Computing, 4.3, pp. 163-174, 1994.
    • J. Burns and C. Mitchell, "Parameter Selection for Server-Aided RSA Computation Schemes," IEEE Transactions on Computing, vol. 4.3, pp. 163-174, 1994.
  • 14
    • 33645791396 scopus 로고    scopus 로고
    • Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes
    • C. Laih and F. Tu, "Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes," International Workshops on Parallel Processing, pp. 167-173, 1999.
    • (1999) International Workshops on Parallel Processing , pp. 167-173
    • Laih, C.1    Tu, F.2
  • 18
    • 84946830399 scopus 로고    scopus 로고
    • On the insecurity of a server-aided RSA. protocol
    • P. Nguyen and I. Shparlinski, "On the insecurity of a server-aided RSA. protocol," Proceedings of Asiacrypt '01, vol. 2248, pp. 21-35, 2001.
    • (2001) Proceedings of Asiacrypt '01 , vol.2248 , pp. 21-35
    • Nguyen, P.1    Shparlinski, I.2
  • 20
    • 84937538476 scopus 로고    scopus 로고
    • Improving SSL Handshake Performance via Batching
    • H. Shacham and D. Boneh, "Improving SSL Handshake Performance via Batching," Proceedings of RSA 2001, vol. 2020, pp. 28-43, 2001.
    • (2001) Proceedings of RSA 2001 , vol.2020 , pp. 28-43
    • Shacham, H.1    Boneh, D.2
  • 24
    • 0002459783 scopus 로고    scopus 로고
    • Client Puzzles: A Cryptographic Defense Against Connection Depletion
    • A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion," 5th Network and Systems Security Symposium, pp. 151-165, 1999.
    • (1999) 5th Network and Systems Security Symposium , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 28
    • 0003226285 scopus 로고    scopus 로고
    • A Course in Computational Algebraic Number Theory
    • H. Cohen, "A Course in Computational Algebraic Number Theory," Graduate Texts in Mathematics, vol. 138, pp. 6, 1996.
    • (1996) Graduate Texts in Mathematics , vol.138 , pp. 6
    • Cohen, H.1
  • 29
    • 0025430939 scopus 로고
    • Cryptanalysis of Short RSA Secret Exponents
    • M. Weiner, "Cryptanalysis of Short RSA Secret Exponents," IEEE Transactions on Information Theory, vol. 36(3), pp. 553-558, 1990.
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.3 , pp. 553-558
    • Weiner, M.1
  • 31


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.