Sciweavers

257 search results - page 4 / 52
» On the Security of RSA Screening
Sort
View
75
Voted
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 5 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
EUROCRYPT
2000
Springer
15 years 1 months ago
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme's security is based on two assumptions namely the strong RSA ass...
Jean-Sébastien Coron, David Naccache
78
Voted
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
81
Voted
ASIACRYPT
2000
Springer
15 years 2 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
73
Voted
ISSA
2008
14 years 11 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...