Sciweavers

7 search results - page 2 / 2
» New Lattice Attacks on DSA Schemes
Sort
View
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
13 years 10 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 4 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener