-
2
-
-
84862323270
-
-
RSA Data Security, Inc
-
RSA Data Security, Inc. The RSA Factoring Challenge. http://www.rsa.com/ rsalabs/node.asp?id=2092.
-
The RSA Factoring Challenge
-
-
-
3
-
-
0035425820
-
An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists
-
A. J. Elbirt, W. Yip, B. Chetwynd, C. Paar. An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 9:545-557, 2001.
-
(2001)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.9
, pp. 545-557
-
-
Elbirt, A.J.1
Yip, W.2
Chetwynd, B.3
Paar, C.4
-
4
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Adi Shamir Ronald Rivest and Len Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Shamir, A.1
Rivest, R.2
Adleman, L.3
-
7
-
-
84957693225
-
A Chosen Ciphertext Attack against Protocols Based on the RSA Encryption Standard PKCS 1; In Crypto
-
1462. Springer-Verlag
-
D. Bleichenbacher. A Chosen Ciphertext Attack against Protocols Based on the RSA Encryption Standard PKCS 1; In Crypto 98, LNCS 1462. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.98
-
-
Bleichenbacher, D.1
-
8
-
-
57849152847
-
Proposal: Rijndael
-
version 2
-
V. R. Joan Daemen. AES Proposal: Rijndael, version 2, AES submission. 1999. http://esrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael-ammended.pdf.
-
(1999)
AES submission
-
-
Joan, V.R.1
Daemen, A.E.S.2
-
10
-
-
57849138396
-
-
Kofahi, N.A. Turki Al-Somani Khalid Al-Zamil. Performance evaluation of three encryption/decryption algorithms. Circuits and Systems, 2003. MWSCAS '03. Proceedings of the 46th IEEE International Midwest Symposium on, 2:790-793, 27-30 December 2003.
-
Kofahi, N.A. Turki Al-Somani Khalid Al-Zamil. Performance evaluation of three encryption/decryption algorithms. Circuits and Systems, 2003. MWSCAS '03. Proceedings of the 46th IEEE International Midwest Symposium on, 2:790-793, 27-30 December 2003.
-
-
-
-
11
-
-
0025430939
-
Cryptanalysis of short rsa secret exponents
-
March
-
M. Wiener. Cryptanalysis of short rsa secret exponents. IEEE Transactions on Information Theory, 160:553-558, March 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.160
, pp. 553-558
-
-
Wiener, M.1
-
12
-
-
57849121956
-
Trading one-wayness against chosen-ciphertext security in factoring-based encryption
-
P. Paillier and J. Villar. Trading one-wayness against chosen-ciphertext security in factoring-based encryption. Advances in Cryptology - Asiacrypt, pages 553-558, 2006.
-
(2006)
Advances in Cryptology - Asiacrypt
, pp. 553-558
-
-
Paillier, P.1
Villar, J.2
-
13
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Advances in Cryptology-CRYPTO, pages 104-113, 1996.
-
(1996)
Advances in Cryptology-CRYPTO
, pp. 104-113
-
-
Kocher, P.C.1
-
14
-
-
57849092592
-
-
W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography, http://eprint.iacr.org/2007/248.pdf, 2007.
-
W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography, http://eprint.iacr.org/2007/248.pdf, 2007.
-
-
-
|