메뉴 건너뛰기




Volumn 1029, Issue , 1996, Pages 215-227

Some active attacks on fast server-aided secret computation protocols for modular exponentiation

Author keywords

Active attack; Cryptography; Modular exponentiation; Server aided secret computation protocol

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 77956774673     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (10)
  • 1
    • 0027617773 scopus 로고
    • Fast Sever-Aided Secret Computation Protocols for Modular Exponentiation
    • 1993
    • Kawamura, S. and Shimbo, A. (1993): "Fast Sever-Aided Secret Computation Protocols for Modular Exponentiation," IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pp. 778-784.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 3
    • 84955605096 scopus 로고
    • Secure Addition Sequence and Its Application on the Server Aided Secret Computation Protocols
    • Gold Coast, Australia, Dec. 1992
    • Laih, C. S. and Yen, S. M. (1992): "Secure Addition Sequence and Its Application on the Server Aided Secret Computation Protocols," A USCRYPT '92, Gold Coast, Australia, Dec. 1992, pp. 6. 1-6. 7.
    • (1992) A USCRYPT '92 , pp. 6.1-6.7
    • Laih, C.S.1    Yen, S.M.2
  • 4
    • 84955571647 scopus 로고
    • Two Efficient Server-Aided Secret Computation Protocols based on the Addition Sequence
    • Fuijyoshida, Japan, Nov. 1991
    • Laih, C. S., Yen, S. M. and Ham, L. (1991): "Two Efficient Server-Aided Secret Computation Protocols based on the Addition Sequence," ASIACRYPT '91, Fuijyoshida, Japan, Nov. 1991, pp. 270-274.
    • (1991) ASIACRYPT '91 , pp. 270-274
    • Laih, C.S.1    Yen, S.M.2    Ham, L.3
  • 5
    • 0343951569 scopus 로고
    • Speed up Secret Computations with Insecure Auxiliary Devices
    • Springer Verlag, New York, 1990
    • Matsumoto, T., Kato, K. and Imai, H. (1988): "Speed up Secret Computations with Insecure Auxiliary Devices," Advances in Crytpology-CRYPTO '88, Springer Verlag, New York, 1990, pp. 497-506.
    • (1988) Advances in Crytpology-CRYPTO '88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 6
    • 0343592915 scopus 로고
    • Attacks on Protocols for Server-Aided RSA Computation
    • Balatonfured, Hugary, 1992
    • Pfitzmann, B. and Waidner, M. (1992): "Attacks on Protocols for Server-Aided RSA Computation," EUROCRYPT '92, Balatonfured, Hugary, 1992, pp. 139-146.
    • (1992) EUROCRYPT '92 , pp. 139-146
    • Pfitzmann, B.1    Waidner, M.2
  • 7
    • 0005063381 scopus 로고
    • Speeding up Smart Card RSA Computation with Insecure Coprocessors
    • Amsterdam, North-Holland, Oct. 1989
    • Quisquater, J.-J., and Soete, M. De (1989): "Speeding up Smart Card RSA Computation with Insecure Coprocessors," Proc. SMART CARD 2000, Amsterdam, North-Holland, Oct. 1989, pp. 191-197.
    • (1989) Proc. SMART CARD 2000 , pp. 191-197
    • Quisquater, J.-J.1    De Soete, M.2
  • 8
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • 1978
    • Rivest, R. L., Shamir, A. and Adleman, L. (1978): "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of ACM, Vol. 21, No. 2, 1978, pp. 120-126.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 9
    • 0025471436 scopus 로고
    • A Factorization Attack on Certain Server-aided Computation Protocols fro RSA Secret Transformation
    • 1990
    • Shimbo, A. and Kawamura, S. (1990): "A Factorization Attack on Certain Server-aided Computation Protocols fro RSA Secret Transformation," Electronic Letters, Vol. 26, No. 17, 1990, pp. 1387-1388.
    • (1990) Electronic Letters , vol.26 , Issue.17 , pp. 1387-1388
    • Shimbo, A.1    Kawamura, S.2
  • 10
    • 0346395014 scopus 로고
    • On the Evaluation of Powers
    • 1976
    • Yao, A. C. (1976): "On the Evaluation of Powers," SIAM J. Comput., Vol. 5, No. 1, 1976, pp. 100-103.
    • (1976) SIAM J. Comput , vol.5 , Issue.1 , pp. 100-103
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.