Sciweavers

7 search results - page 2 / 2
» New Lattice Attacks on DSA Schemes
Sort
View
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 4 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 10 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener