-
1
-
-
0343951569
-
Speeding up Secret Computations with Insecure Auxiliary Devices
-
88, pp
-
T. Matsumoto, K. Kato, and H. Imai, "Speeding up Secret Computations with Insecure Auxiliary Devices," Proceedings of Crypto '88, pp. 497-506, 1988.
-
(1988)
Proceedings of Crypto
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
2
-
-
34247368749
-
-
Private communication, Private communication with D. Wagner
-
Private communication, "Private communication with D. Wagner," 2005.
-
(2005)
-
-
-
3
-
-
34247343551
-
-
Network Working Group, RFC 2246, The TLS Protocol Version 1.0, Internet RFC/STD/FYI/BCP Archives, 1999
-
Network Working Group, "RFC 2246 - The TLS Protocol Version 1.0," Internet RFC/STD/FYI/BCP Archives, 1999, http://www.faqs.org/ rfcs/rfc2246.html.
-
-
-
-
5
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
7
-
-
0020194569
-
Fast decipherment algorithm for RSA. public-key cryptosystem
-
J. Quisquater and C. Couvreur, "Fast decipherment algorithm for RSA. public-key cryptosystem," Electronic Letters, vol. 18, pp. 1905-907, 1982.
-
(1982)
Electronic Letters
, vol.18
, pp. 1905-1907
-
-
Quisquater, J.1
Couvreur, C.2
-
9
-
-
84955578798
-
Attacks on Protocols for Server-Aided RSA Computations
-
92, pp
-
B. Pfitzmann and M. Waidner, "Attacks on Protocols for Server-Aided RSA Computations," Proceedings of Eurocrypt '92, pp. 153-162, 1992.
-
(1992)
Proceedings of Eurocrypt
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
10
-
-
0026897713
-
Attack on Server Assisted Authentication Protocols
-
R. J. Anderson, "Attack on Server Assisted Authentication Protocols," Electronic Letters, vol. 28, pp. 1473, 1992.
-
(1992)
Electronic Letters
, vol.28
, pp. 1473
-
-
Anderson, R.J.1
-
11
-
-
21344491195
-
On verifiable implicit asking protocols for RSA computation
-
T. Matsumoto, H. Imai, C. S. Laih, arid S. M. Yen, "On verifiable implicit asking protocols for RSA computation," Advances in Cryptology - Proceedings of Auscrypt '92, vol. 718, pp. 296-307, 1992.
-
(1992)
Advances in Cryptology - Proceedings of Auscrypt '92
, vol.718
, pp. 296-307
-
-
Matsumoto, T.1
Imai, H.2
Laih, C.S.3
arid, S.4
Yen, M.5
-
12
-
-
84957648348
-
Security and performance of server-aided RSA computation protocols
-
C. H. Lim and P. J. Lee, "Security and performance of server-aided RSA computation protocols," Advances in Cryptology - CRYPTO '95, pp. 70-83, 1995.
-
(1995)
Advances in Cryptology - CRYPTO '95
, pp. 70-83
-
-
Lim, C.H.1
Lee, P.J.2
-
13
-
-
0028381806
-
-
J. Burns and C. Mitchell, Parameter Selection for Server-Aided RSA Computation Schemes, IEEE Transactions on Computing, 4.3, pp. 163-174, 1994.
-
J. Burns and C. Mitchell, "Parameter Selection for Server-Aided RSA Computation Schemes," IEEE Transactions on Computing, vol. 4.3, pp. 163-174, 1994.
-
-
-
-
14
-
-
33645791396
-
Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes
-
C. Laih and F. Tu, "Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes," International Workshops on Parallel Processing, pp. 167-173, 1999.
-
(1999)
International Workshops on Parallel Processing
, pp. 167-173
-
-
Laih, C.1
Tu, F.2
-
16
-
-
0001796258
-
A new approach to server-aided secret computation
-
S. Hong, J. Shin, and H. Lee-Kwang, "A new approach to server-aided secret computation," International Conference on Information Security and Cryptology, pp. 33-45, 1998.
-
(1998)
International Conference on Information Security and Cryptology
, pp. 33-45
-
-
Hong, S.1
Shin, J.2
Lee-Kwang, H.3
-
18
-
-
84946830399
-
On the insecurity of a server-aided RSA. protocol
-
P. Nguyen and I. Shparlinski, "On the insecurity of a server-aided RSA. protocol," Proceedings of Asiacrypt '01, vol. 2248, pp. 21-35, 2001.
-
(2001)
Proceedings of Asiacrypt '01
, vol.2248
, pp. 21-35
-
-
Nguyen, P.1
Shparlinski, I.2
-
19
-
-
0000653210
-
Selecting cryptographic, key sizes
-
A. K. Lenstra and E. R. Verheul, "Selecting cryptographic, key sizes," Journal of Cryptology: the journal of the International Association for Cryptologic Research, vol. 14, no. 4, pp. 255-293, 2001.
-
(2001)
Journal of Cryptology: The journal of the International Association for Cryptologic Research
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
20
-
-
84937538476
-
Improving SSL Handshake Performance via Batching
-
H. Shacham and D. Boneh, "Improving SSL Handshake Performance via Batching," Proceedings of RSA 2001, vol. 2020, pp. 28-43, 2001.
-
(2001)
Proceedings of RSA 2001
, vol.2020
, pp. 28-43
-
-
Shacham, H.1
Boneh, D.2
-
24
-
-
0002459783
-
Client Puzzles: A Cryptographic Defense Against Connection Depletion
-
A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion," 5th Network and Systems Security Symposium, pp. 151-165, 1999.
-
(1999)
5th Network and Systems Security Symposium
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
26
-
-
85030103075
-
Cryptography as a Network Service
-
T. Berson, D. Dean, M. Franklin, D. Smetters, and M. Spreitzer, "Cryptography as a Network Service," 7th Network and Systems Security Symposium, 2001.
-
(2001)
7th Network and Systems Security Symposium
-
-
Berson, T.1
Dean, D.2
Franklin, M.3
Smetters, D.4
Spreitzer, M.5
-
28
-
-
0003226285
-
A Course in Computational Algebraic Number Theory
-
H. Cohen, "A Course in Computational Algebraic Number Theory," Graduate Texts in Mathematics, vol. 138, pp. 6, 1996.
-
(1996)
Graduate Texts in Mathematics
, vol.138
, pp. 6
-
-
Cohen, H.1
-
29
-
-
0025430939
-
Cryptanalysis of Short RSA Secret Exponents
-
M. Weiner, "Cryptanalysis of Short RSA Secret Exponents," IEEE Transactions on Information Theory, vol. 36(3), pp. 553-558, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Weiner, M.1
|