메뉴 건너뛰기




Volumn 963, Issue , 1995, Pages 57-69

Fast server-aided RSA signatures secure against active attacks

Author keywords

[No Author keywords available]

Indexed keywords

DATA TRANSFER;

EID: 84957639068     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44750-4_5     Document Type: Conference Paper
Times cited : (48)

References (16)
  • 2
    • 0026897713 scopus 로고
    • Attack on server-assisted authentication protocols
    • Anderson, R. J.: Attack on server-assisted authentication protocols. Electronic Letters (1992) p. 1473.
    • (1992) Electronic Letters
    • Anderson, R.J.1
  • 5
    • 0028381806 scopus 로고
    • Parameter selection for server-aided RSA computation schemes
    • Burns, J., Mitchell, C. J.: Parameter selection for server-aided RSA computation schemes. IEEE Transactions on computers 43 (1994) pp. 163-174.
    • (1994) IEEE Transactions on computers , vol.43 , pp. 163-174
    • Burns, J.1    Mitchell, C.J.2
  • 7
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • Lenstra, A. K., Lenstra, H. W., Lovász, L.: Factoring polynomials with rational coefficients. Math. Ann. 241 (1982) pp. 515-534.
    • (1982) Math. Ann , vol.241 , pp. 515-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovász, L.3
  • 8
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • vol. Lecture Notes in Computer Science 839 Springer-Verlag
    • Lim, C. H., Lee, P. J.: More flexible exponentiation with precomputation. In Advances in Cryptology - Proceedings of Crypto '94 (1994) vol. Lecture Notes in Computer Science 839 Springer-Verlag pp. 95-107.
    • (1994) Advances in Cryptology - Proceedings of Crypto '94 , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 10
    • 85028812333 scopus 로고
    • On verifiable implicit asking protocols for RSA computation
    • Lecture Notes in Computer Science. Springer-Verlag
    • Matsumoto, T., Imai, H., Laih, C.-S., Yen, S.-M.: On verifiable implicit asking protocols for RSA computation. In Advances in Cryptology - Proceedings of Auscrypt '92 (1993) Lecture Notes in Computer Science vol. 718 Springer-Verlag pp. 296-307.
    • (1993) Advances in Cryptology - Proceedings of Auscrypt '92 , vol.718 , pp. 296-307
    • Matsumoto, T.1    Imai, H.2    Laih, C.-S.3    Yen, S.-M.4
  • 11
    • 85031767993 scopus 로고
    • Speeding up secret computation with insecure auxiliary devices
    • Lecture Notes in Computer Science. Springer-Verlag
    • Matsumoto, T., Kato, K., Imai, H.: Speeding up secret computation with insecure auxiliary devices. In Advances in Cryptology - Proceedings of Crypto '88 (1989) Lecture Notes in Computer Science vol. 403 Springer-Verlag pp. 497-506.
    • (1989) Advances in Cryptology - Proceedings of Crypto '88 , vol.403 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 13
    • 84955578798 scopus 로고
    • Attacks on protocols for server-aided RSA computation
    • Lecture Notes in Computer Science. Springer-Verlag
    • Pfitzmann, B., Waidner, M.: Attacks on protocols for server-aided RSA computation. In Advances in Cryptology - Proceedings of Eurocrypt '92 (1993) Lecture Notes in Computer Science vol. 658 Springer-Verlag pp. 153-162.
    • (1993) Advances in Cryptology - Proceedings of Eurocrypt '92 , vol.658 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 14
    • 0005063381 scopus 로고
    • Speeding up smart card RSA computation with insecure coprocessors
    • Quisquater, J.-J., De Soete, M.: Speeding up smart card RSA computation with insecure coprocessors. In Proceedings of Smart Cards 2000 (1989) pp. 191-197.
    • (1989) Proceedings of Smart Cards 2000 , pp. 191-197
    • Quisquater, J.-J.1    De Soete, M.2
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 16
    • 0026955204 scopus 로고
    • More about the active attack on the server-aided secret computation protocol
    • Yen, S.-M., Laih, C.-S.: More about the active attack on the server-aided secret computation protocol. Electronic Letters (1992) p. 2250.
    • (1992) Electronic Letters , pp. 2250
    • Yen, S.-M.1    Laih, C.-S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.