메뉴 건너뛰기




Volumn 1485, Issue , 1998, Pages 85-96

On the security of some variants of the RSA signature scheme

Author keywords

Cryptanalysis; Digital signature schemes; RSA variants

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84958774093     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055857     Document Type: Conference Paper
Times cited : (5)

References (22)
  • 1
    • 84958675978 scopus 로고    scopus 로고
    • On the Security of the KMOV Public Key cryptosystem, LNCS 1294
    • Springer-Verlag
    • D. Bleichenbacher, “On the Security of the KMOV Public Key cryptosystem”, LNCS 1294, Proc. Crypto’97, Springer-Verlag, (1997), pp. 235-248.
    • (1997) Proc. Crypto’97 , pp. 235-248
    • Bleichenbacher, D.1
  • 2
    • 84957663622 scopus 로고    scopus 로고
    • Some remarks on Lucas-based cryptosystems, LNCS 963
    • Springer-Verlag
    • D. Bleichenbacher, W. Bosma, A. Lenstra, “Some remarks on Lucas-based cryptosystems’, LNCS 963, Proc. Crypto’95, Springer-Verlag, (1997), pp. 386-396.
    • (1997) Proc. Crypto’95 , pp. 386-396
    • Bleichenbacher, D.1    Bosma, W.2    Lenstra, A.3
  • 4
    • 84958799965 scopus 로고    scopus 로고
    • Digital Signature and Public Key Cryptosystem in a Prime Order Subgroup of ~, LNCS 1334
    • Springer-Verlag
    • C. Boyd, “Digital Signature and Public Key Cryptosystem in a Prime Order Subgroup of ~”, LNCS 1334, Proc. ICICS’97, Springer-Verlag, (1997).
    • (1997) Proc. ICICS’97
    • Boyd, C.1
  • 5
    • 84958799966 scopus 로고    scopus 로고
    • Communicated by Colin Boyd
    • Communicated by Colin Boyd.
  • 6
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • 28, 10, October
    • D. Chaum, “Security without identification: transaction systems to make big brother obsolete”, Communications of the ACM, 28, 10, October, (1985), pp. 1030-1044.
    • (1985) Communications of the ACM , pp. 1030-1044
    • Chaum, D.1
  • 7
    • 0010276082 scopus 로고
    • Chosen signature cryptoanalysis on the RSA (MIT) public key cryptosystem
    • Department of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee
    • G.I. Davida, “Chosen signature cryptoanalysis on the RSA (MIT) public key cryptosystem”, Tech. Rep. TR-CS-82-2, Department of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee, (1982).
    • (1982) Tech. Rep. TR-CS-82-2
    • Davida, G.I.1
  • 8
    • 0008538346 scopus 로고
    • A further weakness in the common modulus protocol for the RSA cryptoalgorithm
    • J.M. DeLaurentis, “A further weakness in the common modulus protocol for the RSA cryptoalgorithm’, Cryptologia, No.8, Vol. 3, (1984), pp. 253-259.
    • (1984) Cryptologia , vol.3 , Issue.8 , pp. 253-259
    • Delaurentis, J.M.1
  • 9
    • 84979068869 scopus 로고
    • A new elliptic curve based analogue of RSA, LNCS 768
    • Springer Verlag
    • N. Demytko, “A new elliptic curve based analogue of RSA”, LNCS 768, Proc. Eurocrypt’93, Springer Verlag, (1994), pp. 40-49.
    • (1994) Proc. Eurocrypt’93 , pp. 40-49
    • Demytko, N.1
  • 10
    • 84958957924 scopus 로고    scopus 로고
    • RIPEMD-160, a strengthened version of RIPEMD, LNCS 1039
    • Springer-Verlag
    • H. Dobbertin, A. Bosselaers, B. Preneel, “RIPEMD-160, a strengthened version of RIPEMD”, LNCS 1039, Proc. Fast Software Encryption, Springer-Verlag, (1996), pp. 71-82.
    • (1996) Proc. Fast Software Encryption , pp. 71-82
    • Dobbertin, H.1    Bosselaers, A.2    Preneel, B.3
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen message attacks
    • S. Goldwasser, S. Micali, R. Rivest, “A digital signature scheme secure against adaptive chosen message attacks”, SIAM Journal on Computing, Vol. 17, No. 2,(1988), pp. 281-308.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 12
    • 0003094772 scopus 로고
    • On using RSA with low exponent in a public key network, LNCS 218
    • Springer Verlag
    • J. Hastad, “On using RSA with low exponent in a public key network”, LNCS 218, Proc. Crypto ‘85, Springer Verlag, (1986), pp. 404-408.
    • (1986) Proc. Crypto ‘85 , pp. 404-408
    • Hastad, J.1
  • 13
    • 85012584879 scopus 로고
    • Some Variations on RSA Signatures & their Security, LNCS 263
    • Springer Verlag
    • W. de Jonge, D. Chaum, “Some Variations on RSA Signatures & their Security”, LNCS 263, Proc. Crypto ‘86, Springer Verlag, (1987), pp. 49-59.
    • (1987) Proc. Crypto ‘86 , pp. 49-59
    • De Jonge, W.1    Chaum, D.2
  • 17
    • 0012682583 scopus 로고
    • Some remarks on public key cryptosystems
    • W.B. Miiller, W. NSbauer, “Some remarks on public key cryptosystems”, Studia Sci. Math. Hung., Vol. 16, (1981), pp. 71-76.
    • (1981) Studia Sci. Math. Hung , vol.16 , pp. 71-76
    • Miiller, W.B.1    Nsbauer, W.2
  • 18
    • 0001637933 scopus 로고
    • A Monte Carlo Method for Factorization
    • J. Pollard, “A Monte Carlo Method for Factorization”, BIT, Vol. 15, (1975), pp. 331-334.
    • (1975) BIT , vol.15 , pp. 331-334
    • Pollard, J.1
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM, Vol.21, (1978), pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 0019080452 scopus 로고
    • A modification of the RSA Public-Key Cryptosystem
    • H.C. Williams, “A modification of the RSA Public-Key Cryptosystem”, IEEE Trans. in Inform. Theory, IT-26, No. 6, (1980), pp. 726-729.
    • (1980) IEEE Trans. in Inform. Theory, IT-26 , vol.6 , pp. 726-729
    • Williams, H.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.