Sciweavers

TIFS
2010
186views more  TIFS 2010»
13 years 2 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
EUROCRYPT
1997
Springer
13 years 8 months ago
A New Public-Key Cryptosystem
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by fac...
David Naccache, Jacques Stern
PKC
1998
Springer
134views Cryptology» more  PKC 1998»
13 years 8 months ago
How (not) to Design RSA Signature Schemes
The concept of public-key cryptography was invented in 1976 by Diffie and Hellman [DH]. The following year, Rivest, Shamir and Adleman provided an implementation of this idea [RSA]...
Jean-François Misarsky
ASIACRYPT
2001
Springer
13 years 9 months ago
On the Insecurity of a Server-Aided RSA Protocol
Abstract. At Crypto ’88, Matsumoto, Kato and Imai proposed a protocol, known as RSA-S1, in which a smart card computes an RSA signature, with the help of an untrusted powerful se...
Phong Q. Nguyen, Igor Shparlinski
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
13 years 9 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...