메뉴 건너뛰기




Volumn 1666, Issue , 1999, Pages 1-18

On the security of RSA padding

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84957066742     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48405-1_1     Document Type: Conference Paper
Times cited : (50)

References (37)
  • 3
    • 0030500916 scopus 로고    scopus 로고
    • Asymptotic semismoothness probabilities
    • E. Bach and R. Peralta, Asymptotic semismoothness probabilities, Mathematics of computation, vol. 65, no. 216, pp 1701-1715, 1996.
    • (1996) Mathematics of Computation , vol.65 , Issue.216 , pp. 1701-1715
    • Bach, E.1    Peralta, R.2
  • 8
    • 0002168132 scopus 로고
    • On the number of positive integers ≤ x and free of prime factors ≥ y
    • (cf. as well to part II, vol. 28, pp. 236-247, 1966.)
    • N. de Bruijn, On the number of positive integers ≤ x and free of prime factors ≥ y, Indagationes Mathematicae, vol. 13, pp 50-60, 1951. (cf. as well to part II, vol. 28, pp 236-247, 1966.).
    • (1951) Indagationes Mathematicae , vol.13 , pp. 50-60
    • De Bruijn, N.1
  • 10
    • 84976740532 scopus 로고
    • Digital signatures with RSA and other public-key cryptosystems
    • D. Denning, Digital signatures with RSA and other public-key cryptosystems, Communications of the ACM, vol. 27-4, pp 388-392, 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.4 , pp. 388-392
    • Denning, D.1
  • 11
    • 85030458019 scopus 로고
    • A chosen text attack on the RSA cryp to system and some discrete logarithm schemes
    • Springer-Verlag, Lectures notes in computer science
    • Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryp to system and some discrete logarithm schemes, Advances in cryptology crypto'85, Springer-Verlag, Lectures notes in computer science 218, pp 516-522, 1986.
    • (1986) Advances in Cryptology Crypto'85 , vol.218 , pp. 516-522
    • Desmedt, Y.1    Odlyzko, A.2
  • 12
    • 0002100612 scopus 로고
    • On the frequency of numbers containing prime factors of a certain relative magnitude
    • K. Dickman, On the frequency of numbers containing prime factors of a certain relative magnitude, Arkiv för matematik, astronomi och fysik, vol. 22A, no. 10, pp 1-14, 1930.
    • (1930) Arkiv för Matematik, Astronomi Och Fysik , vol.22A , Issue.10 , pp. 1-14
    • Dickman, K.1
  • 14
    • 84966249438 scopus 로고
    • Asymptotically fast factorization of integers
    • J. Dixon, Asymptotically fast factorization of integers, Mathematics of computation, vol. 36, no. 153, pp 255-260, 1981.
    • (1981) Mathematics of Computation , vol.36 , Issue.153 , pp. 255-260
    • Dixon, J.1
  • 15
    • 0026682116 scopus 로고
    • Which new RSA-signatures can be computed from certain given RSA signatures ?
    • J. Evertse and E. van Heyst, Which new RSA-signatures can be computed from certain given RSA signatures ?, Journal of cryptology vol. 5, no. 1, 41-52, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 41-52
    • Evertse, J.1    Van Heyst, E.2
  • 16
    • 21744431523 scopus 로고    scopus 로고
    • Selective forgery of RSA signatures using redundancy
    • Springer-Verlag, Lectures notes in computer science
    • M. Girault, J.-F. Misarsky, Selective forgery of RSA signatures using redundancy, Advances in cryptology eurocrypt'97, Springer-Verlag, Lectures notes in computer science 1233, pp 495-507, 1997.
    • (1997) Advances in Cryptology Eurocrypt'97 , vol.1233 , pp. 495-507
    • Girault, M.1    Misarsky, J.-F.2
  • 17
    • 0022042754 scopus 로고
    • How to forge RSA key certificates
    • April 25-th
    • J. Gordon, How to forge RSA key certificates, Electronic Letters, vol. 21, no. 9, April 25-th, 1985.
    • (1985) Electronic Letters , vol.21 , Issue.9
    • Gordon, J.1
  • 18
    • 84961356024 scopus 로고
    • Precautions taken against various attacks in iso/iec dis 9796
    • Springer-Verlag, Lectures notes in computer science
    • L. Guillou, J.-J. Quisquater, M. Walker, P. Landrock and C. Shaer, Precautions taken against various attacks in iso/iec dis 9796, Advances in cryptology eurocrypt'90, Springer-Verlag, Lectures notes in computer science 473, pp 465-473, 1991.
    • (1991) Advances in Cryptology Eurocrypt'90 , vol.473 , pp. 465-473
    • Guillou, L.1    Quisquater, J.-J.2    Walker, M.3    Landrock, P.4    Shaer, C.5
  • 20
    • 0004257933 scopus 로고    scopus 로고
    • December 1995. Available electronically at
    • K. Hickman, The SSL Protocol, December 1995. Available electronically at: http://www.netscape.com/newsref/std/ssl.html
    • The SSL Protocol
    • Hickman, K.1
  • 23
  • 28
    • 84958774093 scopus 로고    scopus 로고
    • On the security of some variants of the RSA signature scheme
    • Springer-Verlag, Lectures notes in computer science
    • M. Michels, M. Stadler and H.-M. Sun, On the security of some variants of the RSA signature scheme, Computer security-esorics'98, Springer-Verlag, Lectures notes in computer science 1485, pp 85-96, 1998.
    • (1998) Computer Security-Esorics'98 , vol.1485 , pp. 85-96
    • Michels, M.1    Stadler, M.2    Sun, H.-M.3
  • 29
    • 21744441311 scopus 로고    scopus 로고
    • A multiplicative attack using LLL algorithm on RSA signatures with redundancy
    • Springer-Verlag, Lectures notes in computer science
    • J.-F. Misarsky, A multiplicative attack using LLL algorithm on RSA signatures with redundancy, Advances in cryptology crypto'97, Springer-Verlag, Lectures notes in computer science 1294, pp 221-234, 1997.
    • (1997) Advances in Cryptology Crypto'97 , vol.1294 , pp. 221-234
    • Misarsky, J.-F.1
  • 30
    • 84958961470 scopus 로고    scopus 로고
    • Public-key cryptography, Springer-Verlag, Lectures notes in computer science
    • J.-F. Misarsky, How (not) to design RSA signature schemes, Public-key cryptography, Springer-Verlag, Lectures notes in computer science 1431, pp 14-28, 1998.
    • (1998) How (Not) to Design RSA Signature Schemes , vol.1431 , pp. 14-28
    • Misarsky, J.-F.1
  • 31
    • 73249134721 scopus 로고
    • Secure hash standard
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology, Secure hash standard, FIPS publication 180-1, April 1994.
    • (1994) FIPS Publication , pp. 180-181
  • 33
    • 85027100501 scopus 로고
    • The quadratic sieve factoring algorithm
    • Springer-Verlag, Lectures notes in computer science
    • C. Pomerance, The quadratic sieve factoring algorithm, Advances in cryptology eurocrypt'84, Springer-Verlag, Lectures notes in computer science 209, pp 169-182, 1985.
    • (1985) Advances in Cryptology Eurocrypt'84 , vol.209 , pp. 169-182
    • Pomerance, C.1
  • 35
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21-2, pp 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 37
    • 0019080452 scopus 로고
    • A modification of the RSA public key encryption procedure
    • H. Williams, A modification of the RSA public key encryption procedure, IEEE TIT, vol. 26, pp 726-729, 1980.
    • (1980) IEEE TIT , vol.26 , pp. 726-729
    • Williams, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.