Sciweavers

IJNSEC
2008
96views more  IJNSEC 2008»
13 years 4 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim
NDSS
1999
IEEE
13 years 8 months ago
Experimenting with Shared Generation of RSA Keys
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved...
Michael Malkin, Thomas D. Wu, Dan Boneh
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
13 years 9 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
CARDIS
2010
Springer
175views Hardware» more  CARDIS 2010»
13 years 11 months ago
The Polynomial Composition Problem in (Z/nZ)[X]
Let n be an RSA modulus and let P, Q ∈ (Z/nZ)[X]. This paper explores the following problem: Given polynomials Q and Q(P), find polynomial P. We shed light on the connections be...
Marc Joye, David Naccache, Stéphanie Porte