메뉴 건너뛰기




Volumn 2, Issue 2, 2006, Pages 105-110

Active trial-and-error attack on SASC protocols

Author keywords

Active attack; SASC protocol; Smart card

Indexed keywords

ACTIVE ATTACK; AUXILIARY DEVICE; COMPUTATION PROTOCOLS; COMPUTING POWER; LATTICE REDUCTION; SEARCH SPACES; SECRET INFORMATION; SECURITY PARAMETERS;

EID: 79953900066     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (17)
  • 1
    • 0026897713 scopus 로고
    • Attack on server assisted authentication protocols
    • R. J. Anderson, "Attack on server assisted authentication protocols," Electronics Letters, vol. 28, no. 15, pp. 1473, 1992.
    • (1992) Electronics Letters , vol.28 , Issue.15 , pp. 1473
    • Anderson, R.J.1
  • 2
    • 84955620732 scopus 로고
    • Secure acceleration of DSS signatures using insecure server
    • P. Beguin and J. J. Quisquater, "Secure acceleration of DSS signatures using insecure server," in Asi-acrypt'94, pp. 249-259, 1994.
    • (1994) Asiacrypt'94 , pp. 249-259
    • Beguin, P.1    Quisquater, J.J.2
  • 3
    • 84957639068 scopus 로고
    • Fast server-aided RSA signatures secure against active attacks
    • P. Beguin and J. J. Quisquater, "Fast server-aided RSA signatures secure against active attacks," in Crypto'95, pp. 57-69, 1995.
    • (1995) Crypto'95 , pp. 57-69
    • Beguin, P.1    Quisquater, J.J.2
  • 4
    • 0028381806 scopus 로고
    • Parameter selection for server-aided RSA computation schemes
    • J. Burns and C. J. Mitchell, "Parameter selection for server-aided RSA computation schemes," IEEE Transactions on Computers, vol. 43, no. 2, pp. 163- 174, 1994.
    • (1994) IEEE Transactions on Computers , vol.43 , Issue.2
    • Burns, J.1    Mitchell, C.J.2
  • 6
    • 0027617773 scopus 로고
    • Fast server-aided secret computation protocols for modular exponentiation
    • S. Kawamura and A. Shimbo, "Fast server-aided secret computation protocols for modular exponentiation," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 778-784, 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 7
    • 84961346572 scopus 로고    scopus 로고
    • Accelerating key establisment protocol in mobile communication
    • Springer Verlag
    • S. Lee, S. M. Hong, H. Yoon, and Y. Cho, "Accelerating key establisment protocol in mobile communication," in Information Security and Privacy, LNCS 1587, pp. 51-63, Springer Verlag, 1999.
    • (1999) Information Security and Privacy, LNCS 1587 , pp. 51-63
    • Lee, S.1    Hong, S.M.2    Yoon, H.3    Cho, Y.4
  • 8
    • 84957648348 scopus 로고
    • Security and performance of server-aided RSA computation protocols
    • C. H. Lim and P. J. Lee, "Security and performance of server-aided RSA computation protocols," in Crypto'95, pp. 70-83, 1995.
    • (1995) Crypto'95 , pp. 70-83
    • Lim, C.H.1    Lee, P.J.2
  • 9
    • 85215951475 scopus 로고
    • Server(prover/signer)- aided verification of identity proofs and signature
    • C. H. Lim and P. J. Lee, "Server(prover/signer)- aided verification of identity proofs and signature," in Eurocrypt'95, pp. 64-78, 1995.
    • (1995) Eurocrypt'95 , pp. 64-78
    • Lim, C.H.1    Lee, P.J.2
  • 10
    • 85028812333 scopus 로고
    • On verifiable implicit asking protocols for RSA computation
    • T. Matsumoto, H. Imai, C. S. Laih, and S. M. Yen, "On verifiable implicit asking protocols for RSA computation," in Auscrypt'92, pp. 296-307, 1993.
    • (1993) Auscrypt'92 , pp. 296-307
    • Matsumoto, T.1    Imai, H.2    Laih, C.S.3    Yen, S.M.4
  • 11
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • T. Matsumoto, K. Kato, and H. Imai, "Speeding up secret computations with insecure auxiliary devices," in Crypto'88, pp. 497-506, 1988.
    • (1988) Crypto'88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 12
    • 84947806031 scopus 로고    scopus 로고
    • The beguin-quisquater server-aided RSA protocol from crypto'95 is not secure
    • Springer Verlag
    • P. Nguyen and J. Stern, "The beguin-quisquater server-aided RSA protocol from crypto'95 is not secure," in Advances in Cryptology - Asiacrypt'98, LNCS 1514, pp. 372-379, Springer Verlag, 1998.
    • (1998) Advances in Cryptology - Asiacrypt'98, LNCS 1514 , pp. 372-379
    • Nguyen, P.1    Stern, J.2
  • 13
    • 84955578798 scopus 로고
    • Attacks on protocols for server-aided RSA computation
    • B. Pfitzmann and M.Waidner, "Attacks on protocols for server-aided RSA computation," in Eurocrypt'92, pp. 153-162, 1992.
    • (1992) Eurocrypt'92 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Communications of ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 0025471436 scopus 로고
    • Factorization attack on certain server-aided secret computation protocols for the RSA secret transformation
    • A. Shimbo and S. Kawamura, "Factorization attack on certain server-aided secret computation protocols for the RSA secret transformation," Electronics Letters, vol. 26, no. 17, pp. 1387-1388, 1990.
    • (1990) Electronics Letters , vol.26 , Issue.17 , pp. 1387-1388
    • Shimbo, A.1    Kawamura, S.2
  • 16
    • 0029632472 scopus 로고
    • Cryptanalysis of secure addition chain for SASC applications
    • S. M. Yen, "Cryptanalysis of secure addition chain for SASC applications," Electronics Letters, vol. 31, no. 3, pp. 175-176, 1995.
    • (1995) Electronics Letters , vol.31 , Issue.3 , pp. 175-176
    • Yen, S.M.1
  • 17
    • 0026955204 scopus 로고
    • More about the active attak on the server-aided secret computation protocol
    • S. M. Yen and C. S. Laih, "More about the active attak on the server-aided secret computation protocol," Electronics Letters, vol. 28, no. 24, pp. 2250, 1992.
    • (1992) Electronics Letters , vol.28 , Issue.24 , pp. 2250
    • Yen, S.M.1    Laih, C.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.