메뉴 건너뛰기




Volumn 718 LNCS, Issue , 1993, Pages 219-230

Secure addition sequence and its applications on the server-aided secret computation protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SMART CARDS;

EID: 79958247758     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-57220-1_64     Document Type: Conference Paper
Times cited : (3)

References (16)
  • 1
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • Feb
    • R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," commun. ACM, Vol. 21, pp.120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 3
    • 85029443336 scopus 로고    scopus 로고
    • How to use servers without releasing Privacy-Making IC cards more powerful
    • Rep. ISEC88-33
    • T. Matsumoto and H. Imai, "How to use servers without releasing Privacy-Making IC cards more powerful," IEICE Technical Report, Rep. ISEC88-33.
    • IEICE Technical Report
    • Matsumoto, T.1    Imai, H.2
  • 4
    • 0343951569 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • T. Matsumoto, K. Kato, and It. Imai, "Speeding up secret computations with insecure auxiliary devices," Proc. of CRYPTO'88, pp.497-506, 1988.
    • (1988) Proc. Of CRYPTO'88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, I.T.3
  • 5
    • 85028847982 scopus 로고
    • Computation methods for RSA with the aid of powerful terminals
    • Gotemba, Japan (Feb. 2-4
    • S. Kawamura and A. Shimbo, "Computation methods for RSA with the aid of powerful terminals," 1989 Sym. On Cryptography and Inf. Security, Gotemba, Japan (Feb. 2-4 1989).
    • (1989) 1989 Sym. On Cryptography and Inf. Security
    • Kawamura, S.1    Shimbo, A.2
  • 6
    • 85028853429 scopus 로고    scopus 로고
    • A method for computing an RSA signature with the aid of an auxiliaxy termima1
    • A-105
    • S. Kawamura and A. Shimbo, "A method for computing an RSA signature with the aid of an auxiliaxy termima1," 1989 IEICE Autumn Natl. Cony. Rec. A-105.
    • 1989 IEICE Autumn Natl. Cony. Rec
    • Kawamura, S.1    Shimbo, A.2
  • 7
    • 84915421915 scopus 로고
    • Speeding up smart card RSA computations with insecure coprocessors
    • Amsterdam (Oct
    • J.J. Quisquater and M. Dc Soete, "Speeding up smart card RSA computations with insecure coprocessors," Proc. SMART CARD 2000. Amsterdam (Oct. 1989).
    • (1989) Proc. SMART CARD 2000
    • Quisquater, J.J.1    Dc Soete, M.2
  • 8
    • 33746255697 scopus 로고
    • Performance analysis of Server-Aided Secret Com- Putation protocols for the RSA cryptosystem
    • Jul
    • S. Kawamura and A. Shimbo, "Performance analysis of Server-Aided Secret Com- Putation protocols for the RSA cryptosystem," The Trans. of the IEICE, vol. E73, No. 7, pp. 1073-1080, Jul. 1990.
    • (1990) The Trans. Of the IEICE , vol.E73 , Issue.7 , pp. 1073-1080
    • Kawamura, S.1    Shimbo, A.2
  • 9
    • 0003657590 scopus 로고
    • Seminumerical algorithms. Reading, Addison Wesley
    • D.E. Knuth, The art of computer programming, Vol. 2: Seminumerical algorithms. Reading, Addison Wesley, 1969.
    • (1969) The Art of Computer Programming , vol.2
    • Knuth, D.E.1
  • 10
    • 0000742754 scopus 로고    scopus 로고
    • Addition Chain Heuristics
    • Springer-Verlag Lecture Notes in Computer Science
    • J. Bos, M. Coster, "Addition Chain Heuristics," Proceedings CRYPTO'89, Springer-Verlag Lecture Notes in Computer Science, pp. 400-407.
    • Proceedings CRYPTO'89 , pp. 400-407
    • Bos, J.1    Coster, M.2
  • 11
    • 0009399673 scopus 로고
    • Computing sequences with addition chains
    • P. Downey and B. Leony and R. Sethi, "Computing sequences with addition chains," Siam Journal Comput. 3 (1981) pp.638-696.
    • (1981) Siam Journal Comput , vol.3 , pp. 638-696
    • Downey, P.1    Leony, B.2    Sethi, R.3
  • 12
    • 0346395014 scopus 로고
    • On the evaluation of powers
    • Andrew Yao, "On the evaluation of powers," Siam. J. Comput. 5, (1976).
    • (1976) Siam. J. Comput. , vol.5
    • Yao, A.1
  • 13
    • 84955571647 scopus 로고    scopus 로고
    • Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence
    • and to be appeared in The Lecture Notes in Computer Science by Springer-Verlag
    • C.S. Laih, S.M. Yen and L. Harn, "Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence," Proc. Of the ASIACRYPT'91 and to be appeared in The Lecture Notes in Computer Science by Springer-Verlag.
    • Proc. Of the ASIACRYPT'91
    • Laih, C.S.1    Yen, S.M.2    Harn, L.3
  • 15
    • 0025471436 scopus 로고
    • Factorization Attack on Certain Server-Aided Computation Protocols for the RSA Secret Transformation
    • A. Shimbo and S. Kawamura, "Factorization Attack on Certain Server-Aided Computation Protocols for the RSA Secret Transformation," Electronics Letters, Vol. 26, No. 17, pp. 1387-1388, 1990.
    • (1990) Electronics Letters , vol.26 , Issue.17 , pp. 1387-1388
    • Shimbo, A.1    Kawamura, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.