-
1
-
-
0003751190
-
-
October 1, Available at
-
RSA Laboratories. PKCS #1 v2.0: RSA cryptography standard, October 1, 1998. Available at http://www.rsasecurity.com/rsalabs/pkcs/.
-
(1998)
PKCS #1 V2.0: RSA Cryptography Standard
-
-
-
2
-
-
84944931653
-
-
Draft 2, 5, Available at
-
RSA Laboratories. PKCS #1 v2.1: RSA cryptography standard, Draft 2, January 5, 2001. Available at http://www.rsasecurity.com/rsalabs/pkcs/.
-
(2001)
PKCS #1 V2.1: RSA Cryptography Standard
, Issue.January
-
-
-
3
-
-
84956981493
-
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
-
B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds, Springer-Verlag
-
F. Bao, R. Deng, Y. Han, A. Jeng, A. D. Narasimhalu, and T.-H. Ngair. Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds, Security Protocols, vol. 1361 of Lecture Notes in Computer Science, pp. 115–124, Springer-Verlag, 1998.
-
(1998)
Security Protocols, Vol. 1361 of Lecture Notes in Computer Science
, pp. 115-124
-
-
Bao, F.1
Deng, R.2
Han, Y.3
Jeng, A.4
Narasimhalu, A.D.5
Ngair, T.-H.6
-
4
-
-
84948986458
-
Optimal asymmetric encryption — How to encrypt with RSA
-
A. De Santis, ed, Springer-Verlag
-
Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption — How to encrypt with RSA. In A. De Santis, ed., Advances in Cryptology – EUROCRYPT’94, vol. 950 of Lecture Notes in Computer Science, pp. 92–111, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology – EUROCRYPT’94, Vol. 950 of Lecture Notes in Computer Science
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84957693225
-
A chosen ciphertext attack against protocols based on the RSA encryption standard RSA PKCS #1
-
H. Krawczyk, ed, Springer-Verlag
-
Daniel Bleichenbacher. A chosen ciphertext attack against protocols based on the RSA encryption standard RSA PKCS #1. In H. Krawczyk, ed., Advances in Cryptology – CRYPTO’98, vol. 1462 of Lecture Notes in Computer Science, pp. 1–12, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology – CRYPTO’98, Vol. 1462 of Lecture Notes in Computer Science
, pp. 1-12
-
-
Bleichenbacher, D.1
-
7
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
Dan Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2):203–213, 1999.
-
(1999)
Notices of the AMS
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
8
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
W. Fumy, Springer-Verlag
-
Dan Boneh, Richard A. DeMillo and Richard J. Lipton. On the importance of checking cryptographic protocols for faults. In W. Fumy, ed., Advances in Cryptology – EUROCRYPT’97, vol. 1233 of Lecture Notes in Computer Science, pp. 37–51, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology – EUROCRYPT’97, Vol. 1233 of Lecture Notes in Computer Science
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
9
-
-
84937418785
-
Why Textbook El Gamal and RSA encryption are insecure
-
Springer-Verlag
-
Dan Boneh, Antoine Joux, and Phong Q. Nguyen. Why Textbook El Gamal and RSA encryption are insecure. In T. Okamoto, ed., Advances in Cryptology – ASIACRYPT2000, vol. 1976 of Lecture Notes in Computer Science, pp. 30–43, Springer-Verlag, 2000.
-
(2000)
T. Okamoto, Ed., Advances in Cryptology – ASIACRYPT2000, Vol. 1976 of Lecture Notes in Computer Science
, pp. 30-43
-
-
Boneh, D.1
Joux, A.2
Nguyen, P.Q.3
-
10
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
Don Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10(4):233–260, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
11
-
-
84956859011
-
How to enhance the security of public-key encryption at minimum cost
-
H. Imai and Y. Zheng, Springer-Verlag
-
Eiichiro Fujisaki and Tatsuaki Okamoto. How to enhance the security of public-key encryption at minimum cost. In H. Imai and Y. Zheng, eds., Public Key Cryptography, vol. 1560 of Lecture Notes in Computer Science, pp. 53–68, Springer-Verlag, 1999.
-
(1999)
Public Key Cryptography, Vol. 1560 of Lecture Notes in Computer Science
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
12
-
-
84880853825
-
RSA– OAEP is secure under the RSA assumption
-
J. Kilian, Springer- Verlag
-
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSA– OAEP is secure under the RSA assumption. In J. Kilian, ed., Advances in Cryptology – CRYPTO2001, vol. 2139 of Lecture Notes in Computer Science, Springer- Verlag, 2001.
-
(2001)
Advances in Cryptology – CRYPTO2001, Vol. 2139 of Lecture Notes in Computer Science
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
13
-
-
0032206093
-
Attacks on Shamir’s ‘RSA for paranoids’
-
Henri Gilbert, Dipankar Gupta, Andrew Odlyzko, and Jean-Jacques Quisquater. Attacks on Shamir’s ‘RSA for paranoids’. Information Processing Letters, 68:197–199, 1998.
-
(1998)
Information Processing Letters
, vol.68
, pp. 197-199
-
-
Gilbert, H.1
Gupta, D.2
Odlyzko, R.3
Quisquater, J.-J.4
-
15
-
-
0004794569
-
Chinese remaindering cryptosystems in the presence of faults
-
Marc Joye, Arjen K. Lenstra, and Jean-Jacques Quisquater. Chinese remaindering cryptosystems in the presence of faults. Journal of Cryptology, 12(4):241-245, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, J.-J.3
-
16
-
-
35248856474
-
Secure evaluation of modular functions
-
R.J. Hwang and C.K. Wu, Taipei, Taiwan, September 26–28
-
Marc Joye, Pascal Paillier, and Sung-Ming Yen. Secure evaluation of modular functions. In R.J. Hwang and C.K. Wu, eds., Proc. of the 2001 International Workshop on Cryptology and Network Security (CNS 2001), pp. 227–229, Taipei, Taiwan, September 26–28, 2001.
-
(2001)
Proc. Of the 2001 International Workshop on Cryptology and Network Security (CNS 2001)
, pp. 227-229
-
-
Joye, M.1
Paillier, P.2
Yen, S.-M.3
-
17
-
-
84949230268
-
RSA-type signatures in the presence of transient faults
-
M. Darnell, Springer- Verlag
-
Marc Joye, Jean-Jacques Quisquater, Feng Bao, and Robert H. Deng. RSA-type signatures in the presence of transient faults. In M. Darnell, ed., Cryptography and Coding, vol. 1355 of Lecture Notes in Computer Science, pp. 155–160, Springer- Verlag, 1997.
-
(1997)
Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science
, pp. 155-160
-
-
Joye, M.1
Quisquater, J.-J.2
Bao, F.3
Deng, R.H.4
-
18
-
-
84937539109
-
On the power of misbehaving adversaries and security analysis of the original EPOC
-
D. Naccache, Springer-Verlag
-
Marc Joye, Jean-Jacques Quisquater, and Moti Yung. On the power of misbehaving adversaries and security analysis of the original EPOC. In D. Naccache, ed., Topics in Cryptology – CT-RSA 2001, vol. 2020 of Lecture Notes in Computer Science, pp. 208–222, Springer-Verlag, 2001.
-
(2001)
Topics in Cryptology – CT-RSA 2001, Vol. 2020 of Lecture Notes in Computer Science
, pp. 208-222
-
-
Joye, M.1
Quisquater, J.-J.2
Yung, M.3
-
20
-
-
0003421346
-
-
Technical Report TR 801, RSA Laboratories, April
-
Çetin K. Koç. RSA hardware implementation. Technical Report TR 801, RSA Laboratories, April 1996.
-
(1996)
RSA Hardware Implementation
-
-
Koç, Ç.K.1
-
21
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, Springer-Verlag
-
Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology – CRYPTO’99, vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology – CRYPTO’99, Vol. 1666 of Lecture Notes in Computer Science
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
22
-
-
33846862428
-
A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1
-
J. Kilian, ed, Springer-Verlag
-
James Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1. In J. Kilian, ed., Advances in Cryptology – CRYPTO2001, vol. 2139 of Lecture Notes in Computer Science, pp. 230–238, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology – CRYPTO2001, Vol. 2139 of Lecture Notes in Computer Science
, pp. 230-238
-
-
Manger, J.1
-
24
-
-
0041312251
-
The future of integer factorization
-
Andrew Odlyzko. The future of integer factorization. Cryptobytes, 1(2):5–12, 1995.
-
(1995)
Cryptobytes
, vol.1
, Issue.2
, pp. 5-12
-
-
Odlyzko, A.1
-
25
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
Jean-Jacques Quisquater and Chantal Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters, 18:905–907, 1982.
-
(1982)
Electronics Letters
, vol.18
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
-
26
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
J. Feigenbaum, Springer-Verlag
-
Charles Rackoff and Daniel R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In J. Feigenbaum, ed., Advances in Cryptology – CRYPTO’91, vol. 576 of Lecture Notes in Computer Science, pp. 433–444, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology – CRYPTO’91, Vol. 576 of Lecture Notes in Computer Science
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
28
-
-
0008631959
-
RSA for paranoids
-
Adi Shamir. RSA for paranoids. Cryptobytes, 1(2):1–4, 1995.
-
(1995)
Cryptobytes
, vol.1
, Issue.2
, pp. 1-4
-
-
Shamir, A.1
-
32
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
Sung-Ming Yen and Marc Joye. Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers, 49(9):967–970, 2000.
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.-M.1
Joye, M.2
|