Sciweavers

69 search results - page 4 / 14
» rsa 2008
Sort
View
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
13 years 7 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 6 months ago
A variant of Wiener's attack on RSA
Andrej Dujella
IJNSEC
2008
166views more  IJNSEC 2008»
13 years 6 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
RSA
2008
89views more  RSA 2008»
13 years 5 months ago
Simple permutations mix even better
We study the random composition of a small family of O(n3 ) simple permutations on {0, 1}n . Specifically we ask how many randomly selected simple permutations need be composed to...
Alex Brodsky, Shlomo Hoory