-
1
-
-
0026897713
-
Attack on server assisted authentication protocols
-
R. J. Anderson, "Attack on server assisted authentication protocols," Electronics Letters, vol. 28, no. 15, pp. 1473, 1992.
-
(1992)
Electronics Letters
, vol.28
, Issue.15
, pp. 1473
-
-
Anderson, R.J.1
-
2
-
-
84955620732
-
Secure acceleration of DSS signatures using insecure server
-
P. Beguin and J. J. Quisquater, "Secure acceleration of DSS signatures using insecure server," in Asi-acrypt'94, pp. 249-259, 1994.
-
(1994)
Asiacrypt'94
, pp. 249-259
-
-
Beguin, P.1
Quisquater, J.J.2
-
3
-
-
84957639068
-
Fast server-aided RSA signatures secure against active attacks
-
P. Beguin and J. J. Quisquater, "Fast server-aided RSA signatures secure against active attacks," in Crypto'95, pp. 57-69, 1995.
-
(1995)
Crypto'95
, pp. 57-69
-
-
Beguin, P.1
Quisquater, J.J.2
-
4
-
-
0028381806
-
Parameter selection for server-aided RSA computation schemes
-
J. Burns and C. J. Mitchell, "Parameter selection for server-aided RSA computation schemes," IEEE Transactions on Computers, vol. 43, no. 2, pp. 163- 174, 1994.
-
(1994)
IEEE Transactions on Computers
, vol.43
, Issue.2
-
-
Burns, J.1
Mitchell, C.J.2
-
5
-
-
0001796258
-
A new approach to server-aided secret computation
-
S. M. Hong, J. B. Shin, H. Lee-Kwnag, and H. Yoon, "A new approach to server-aided secret computation," in International Conference on Information Secuirty and Cryptology (ICISC'98), pp. 33-45, 1998.
-
(1998)
International Conference on Information Secuirty and Cryptology (ICISC'98)
, pp. 33-45
-
-
Hong, S.M.1
Shin, J.B.2
Lee-Kwnag, H.3
Yoon, H.4
-
6
-
-
0027617773
-
Fast server-aided secret computation protocols for modular exponentiation
-
S. Kawamura and A. Shimbo, "Fast server-aided secret computation protocols for modular exponentiation," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 778-784, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.1
Shimbo, A.2
-
7
-
-
84961346572
-
Accelerating key establisment protocol in mobile communication
-
Springer Verlag
-
S. Lee, S. M. Hong, H. Yoon, and Y. Cho, "Accelerating key establisment protocol in mobile communication," in Information Security and Privacy, LNCS 1587, pp. 51-63, Springer Verlag, 1999.
-
(1999)
Information Security and Privacy, LNCS 1587
, pp. 51-63
-
-
Lee, S.1
Hong, S.M.2
Yoon, H.3
Cho, Y.4
-
8
-
-
84957648348
-
Security and performance of server-aided RSA computation protocols
-
C. H. Lim and P. J. Lee, "Security and performance of server-aided RSA computation protocols," in Crypto'95, pp. 70-83, 1995.
-
(1995)
Crypto'95
, pp. 70-83
-
-
Lim, C.H.1
Lee, P.J.2
-
9
-
-
85215951475
-
Server(prover/signer)- aided verification of identity proofs and signature
-
C. H. Lim and P. J. Lee, "Server(prover/signer)- aided verification of identity proofs and signature," in Eurocrypt'95, pp. 64-78, 1995.
-
(1995)
Eurocrypt'95
, pp. 64-78
-
-
Lim, C.H.1
Lee, P.J.2
-
10
-
-
85028812333
-
On verifiable implicit asking protocols for RSA computation
-
T. Matsumoto, H. Imai, C. S. Laih, and S. M. Yen, "On verifiable implicit asking protocols for RSA computation," in Auscrypt'92, pp. 296-307, 1993.
-
(1993)
Auscrypt'92
, pp. 296-307
-
-
Matsumoto, T.1
Imai, H.2
Laih, C.S.3
Yen, S.M.4
-
11
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
T. Matsumoto, K. Kato, and H. Imai, "Speeding up secret computations with insecure auxiliary devices," in Crypto'88, pp. 497-506, 1988.
-
(1988)
Crypto'88
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
12
-
-
84947806031
-
The beguin-quisquater server-aided RSA protocol from crypto'95 is not secure
-
Springer Verlag
-
P. Nguyen and J. Stern, "The beguin-quisquater server-aided RSA protocol from crypto'95 is not secure," in Advances in Cryptology - Asiacrypt'98, LNCS 1514, pp. 372-379, Springer Verlag, 1998.
-
(1998)
Advances in Cryptology - Asiacrypt'98, LNCS 1514
, pp. 372-379
-
-
Nguyen, P.1
Stern, J.2
-
13
-
-
84955578798
-
Attacks on protocols for server-aided RSA computation
-
B. Pfitzmann and M.Waidner, "Attacks on protocols for server-aided RSA computation," in Eurocrypt'92, pp. 153-162, 1992.
-
(1992)
Eurocrypt'92
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Communications of ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
0025471436
-
Factorization attack on certain server-aided secret computation protocols for the RSA secret transformation
-
A. Shimbo and S. Kawamura, "Factorization attack on certain server-aided secret computation protocols for the RSA secret transformation," Electronics Letters, vol. 26, no. 17, pp. 1387-1388, 1990.
-
(1990)
Electronics Letters
, vol.26
, Issue.17
, pp. 1387-1388
-
-
Shimbo, A.1
Kawamura, S.2
-
16
-
-
0029632472
-
Cryptanalysis of secure addition chain for SASC applications
-
S. M. Yen, "Cryptanalysis of secure addition chain for SASC applications," Electronics Letters, vol. 31, no. 3, pp. 175-176, 1995.
-
(1995)
Electronics Letters
, vol.31
, Issue.3
, pp. 175-176
-
-
Yen, S.M.1
-
17
-
-
0026955204
-
More about the active attak on the server-aided secret computation protocol
-
S. M. Yen and C. S. Laih, "More about the active attak on the server-aided secret computation protocol," Electronics Letters, vol. 28, no. 24, pp. 2250, 1992.
-
(1992)
Electronics Letters
, vol.28
, Issue.24
, pp. 2250
-
-
Yen, S.M.1
Laih, C.S.2
|