메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 505-510

A comparative study of the performance and security issues of AES and RSA cryptography

Author keywords

[No Author keywords available]

Indexed keywords

ADVANCED ENCRYPTION STANDARDS; COMMUNICATION CHANNELS; COMMUNICATION SECURITIES; COMPARATIVE STUDIES; COMPUTATIONAL ISSUES; CRYPTOGRAPHIC PRIMITIVES; ENCRYPTION SCHEMES; RSA ALGORITHMS; RSA CRYPTOGRAPHIES; RSA SECURITIES; SECURITY ISSUES;

EID: 57849131733     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCIT.2008.179     Document Type: Conference Paper
Times cited : (99)

References (15)
  • 2
    • 84862323270 scopus 로고    scopus 로고
    • RSA Data Security, Inc
    • RSA Data Security, Inc. The RSA Factoring Challenge. http://www.rsa.com/ rsalabs/node.asp?id=2092.
    • The RSA Factoring Challenge
  • 4
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Adi Shamir Ronald Rivest and Len Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Shamir, A.1    Rivest, R.2    Adleman, L.3
  • 7
    • 84957693225 scopus 로고    scopus 로고
    • A Chosen Ciphertext Attack against Protocols Based on the RSA Encryption Standard PKCS 1; In Crypto
    • 1462. Springer-Verlag
    • D. Bleichenbacher. A Chosen Ciphertext Attack against Protocols Based on the RSA Encryption Standard PKCS 1; In Crypto 98, LNCS 1462. Springer-Verlag, 1998.
    • (1998) LNCS , vol.98
    • Bleichenbacher, D.1
  • 8
    • 57849152847 scopus 로고    scopus 로고
    • Proposal: Rijndael
    • version 2
    • V. R. Joan Daemen. AES Proposal: Rijndael, version 2, AES submission. 1999. http://esrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael-ammended.pdf.
    • (1999) AES submission
    • Joan, V.R.1    Daemen, A.E.S.2
  • 10
    • 57849138396 scopus 로고    scopus 로고
    • Kofahi, N.A. Turki Al-Somani Khalid Al-Zamil. Performance evaluation of three encryption/decryption algorithms. Circuits and Systems, 2003. MWSCAS '03. Proceedings of the 46th IEEE International Midwest Symposium on, 2:790-793, 27-30 December 2003.
    • Kofahi, N.A. Turki Al-Somani Khalid Al-Zamil. Performance evaluation of three encryption/decryption algorithms. Circuits and Systems, 2003. MWSCAS '03. Proceedings of the 46th IEEE International Midwest Symposium on, 2:790-793, 27-30 December 2003.
  • 11
    • 0025430939 scopus 로고
    • Cryptanalysis of short rsa secret exponents
    • March
    • M. Wiener. Cryptanalysis of short rsa secret exponents. IEEE Transactions on Information Theory, 160:553-558, March 1990.
    • (1990) IEEE Transactions on Information Theory , vol.160 , pp. 553-558
    • Wiener, M.1
  • 12
    • 57849121956 scopus 로고    scopus 로고
    • Trading one-wayness against chosen-ciphertext security in factoring-based encryption
    • P. Paillier and J. Villar. Trading one-wayness against chosen-ciphertext security in factoring-based encryption. Advances in Cryptology - Asiacrypt, pages 553-558, 2006.
    • (2006) Advances in Cryptology - Asiacrypt , pp. 553-558
    • Paillier, P.1    Villar, J.2
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Advances in Cryptology-CRYPTO, pages 104-113, 1996.
    • (1996) Advances in Cryptology-CRYPTO , pp. 104-113
    • Kocher, P.C.1
  • 14
    • 57849092592 scopus 로고    scopus 로고
    • W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography, http://eprint.iacr.org/2007/248.pdf, 2007.
    • W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography, http://eprint.iacr.org/2007/248.pdf, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.