Sciweavers

15 search results - page 1 / 3
» pkc 1999
Sort
View
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
13 years 8 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
PKC
1999
Springer
211views Cryptology» more  PKC 1999»
13 years 8 months ago
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key confirmation. Various me...
Simon Blake-Wilson, Alfred Menezes