-
1
-
-
0027617773
-
Fast Sever-Aided Secret Computation Protocols for Modular Exponentiation
-
1993
-
Kawamura, S. and Shimbo, A. (1993): "Fast Sever-Aided Secret Computation Protocols for Modular Exponentiation," IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pp. 778-784.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.1
Shimbo, A.2
-
2
-
-
0003657590
-
-
2nd Ed., Addition-Wesley, Reading, MA, 1981
-
Knuth, D. E. (1981): "The Art of Computer Programming Vol 2: Seminumerical Algorithms," 2nd Ed., Addition-Wesley, Reading, MA, 1981, pp. 451.
-
(1981)
The Art of Computer Programming Vol 2: Seminumerical Algorithms
-
-
Knuth, D.E.1
-
3
-
-
84955605096
-
Secure Addition Sequence and Its Application on the Server Aided Secret Computation Protocols
-
Gold Coast, Australia, Dec. 1992
-
Laih, C. S. and Yen, S. M. (1992): "Secure Addition Sequence and Its Application on the Server Aided Secret Computation Protocols," A USCRYPT '92, Gold Coast, Australia, Dec. 1992, pp. 6. 1-6. 7.
-
(1992)
A USCRYPT '92
, pp. 6.1-6.7
-
-
Laih, C.S.1
Yen, S.M.2
-
4
-
-
84955571647
-
Two Efficient Server-Aided Secret Computation Protocols based on the Addition Sequence
-
Fuijyoshida, Japan, Nov. 1991
-
Laih, C. S., Yen, S. M. and Ham, L. (1991): "Two Efficient Server-Aided Secret Computation Protocols based on the Addition Sequence," ASIACRYPT '91, Fuijyoshida, Japan, Nov. 1991, pp. 270-274.
-
(1991)
ASIACRYPT '91
, pp. 270-274
-
-
Laih, C.S.1
Yen, S.M.2
Ham, L.3
-
5
-
-
0343951569
-
Speed up Secret Computations with Insecure Auxiliary Devices
-
Springer Verlag, New York, 1990
-
Matsumoto, T., Kato, K. and Imai, H. (1988): "Speed up Secret Computations with Insecure Auxiliary Devices," Advances in Crytpology-CRYPTO '88, Springer Verlag, New York, 1990, pp. 497-506.
-
(1988)
Advances in Crytpology-CRYPTO '88
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
6
-
-
0343592915
-
Attacks on Protocols for Server-Aided RSA Computation
-
Balatonfured, Hugary, 1992
-
Pfitzmann, B. and Waidner, M. (1992): "Attacks on Protocols for Server-Aided RSA Computation," EUROCRYPT '92, Balatonfured, Hugary, 1992, pp. 139-146.
-
(1992)
EUROCRYPT '92
, pp. 139-146
-
-
Pfitzmann, B.1
Waidner, M.2
-
7
-
-
0005063381
-
Speeding up Smart Card RSA Computation with Insecure Coprocessors
-
Amsterdam, North-Holland, Oct. 1989
-
Quisquater, J.-J., and Soete, M. De (1989): "Speeding up Smart Card RSA Computation with Insecure Coprocessors," Proc. SMART CARD 2000, Amsterdam, North-Holland, Oct. 1989, pp. 191-197.
-
(1989)
Proc. SMART CARD 2000
, pp. 191-197
-
-
Quisquater, J.-J.1
De Soete, M.2
-
8
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
1978
-
Rivest, R. L., Shamir, A. and Adleman, L. (1978): "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of ACM, Vol. 21, No. 2, 1978, pp. 120-126.
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
9
-
-
0025471436
-
A Factorization Attack on Certain Server-aided Computation Protocols fro RSA Secret Transformation
-
1990
-
Shimbo, A. and Kawamura, S. (1990): "A Factorization Attack on Certain Server-aided Computation Protocols fro RSA Secret Transformation," Electronic Letters, Vol. 26, No. 17, 1990, pp. 1387-1388.
-
(1990)
Electronic Letters
, vol.26
, Issue.17
, pp. 1387-1388
-
-
Shimbo, A.1
Kawamura, S.2
-
10
-
-
0346395014
-
On the Evaluation of Powers
-
1976
-
Yao, A. C. (1976): "On the Evaluation of Powers," SIAM J. Comput., Vol. 5, No. 1, 1976, pp. 100-103.
-
(1976)
SIAM J. Comput
, vol.5
, Issue.1
, pp. 100-103
-
-
Yao, A.C.1
|