搜索结果: 1-15 共查到“军事学 RSA”相关记录163条 . 查询时间(0.125 秒)
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
RSA Cryptanalysis Coppersmith's method
font style='font-size:12px;'>
2019/9/19
Let N=pqN=pq be an RSA modulus and ee be a public exponent. Numerous attacks on RSA exploit the arithmetical properties of the key equation ed−k(p−1)(q−1)=1ed−k(p−1)(q...
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
digital signatures distributed cryptography implementation
font style='font-size:12px;'>
2019/2/27
Migration of security applications to the cloud poses unique challenges in key management and protection: asymmetric keys which would previously have resided in tamper-resistant, on-premise Hardware S...
Deep Learning to Evaluate Secure RSA Implementations
Side-Channel Attacks RSA Deep Learning
font style='font-size:12px;'>
2019/1/26
This paper presents the results of several successful profiled side-channel attacks against a secure implementation of the RSA algorithm. The implementation was running on a ARM Core SC 100 completed ...
Towards RSA-OAEP without Random Oracles
public-key cryptography RSA-OAEP
font style='font-size:12px;'>
2018/12/3
We give the first positive results about instantiability of the widely implemented and standardized RSA-OAEP encryption scheme of Bellare and Rogaway (EUROCRYPT 1994) and variants under chosen-ciphert...
RSA Signatures Under Hardware Restrictions
public-key cryptography RSA
font style='font-size:12px;'>
2018/11/13
We would like to compute RSA signatures with the help of a Hardware Security Module (HSM). But what can we do when we want to use a certain public exponent that the HSM does not allow or support? Surp...
Improved Results on Factoring General RSA Moduli with Known Bits
Factorization General RSA moduli Known bits Integer method
font style='font-size:12px;'>
2018/6/25
We revisit the factoring with known bits problem on general RSA moduli in the forms of N=prqsN=prqs for r,s≥1r,s≥1, where two primes pp and qq are of the same bit-size. The relevant moduli are inclusi...
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
cryptographic protocols RSA
font style='font-size:12px;'>
2018/6/7
We present two new, highly efficient, protocols for securely generating a distributed RSA key pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously secure. Both...
Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
RSA Cryptanalysis Lattice
font style='font-size:12px;'>
2018/6/6
We present two attacks on RSA as its applications. One focuses on the case with known bits of the private exponent together with the prime factor, and the other considers the case with a small differe...
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
public-key cryptography RSA
font style='font-size:12px;'>
2018/5/28
Thus far, several lattice-based algorithms for partial key exposure attacks on RSA, i.e., given the most/least significant bits (MSBs/LSBs) of a secret exponent dd and factoring an RSA modulus NN, hav...
Learning with Errors on RSA Co-Processors
Kyber lattice-based cryptography smart card
font style='font-size:12px;'>
2018/5/11
We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by exploiting the availability of fast long integer multiplication. Such co-processors are deployed in smart cards in...
Distributed SSH Key Management with Proactive RSA Threshold Signatures
distributed cryptography implementation RSA secret sharing
font style='font-size:12px;'>
2018/5/2
SSH is a security network protocol that uses public key cryptography for client authentication. SSH connections are designed to be run between a client and a server and therefore in enterprise network...
Cache-Timing Attacks on RSA Key Generation
applied cryptography public key cryptography RSA
font style='font-size:12px;'>
2018/4/25
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
Multi-power Post-quantum RSA
public-key cryptography post-quantum cryptography
font style='font-size:12px;'>
2018/4/10
Special purpose factoring algorithms have discouraged the adoption of multi-power RSA, even in a post-quantum setting. We revisit the known attacks and find that a general recommendation against repea...
Synchronized Aggregate Signatures from the RSA Assumption
signatures aggregate RSA
font style='font-size:12px;'>
2018/1/25
In this work we construct efficient aggregate signatures from the RSA assumption in the synchronized setting. In this setting, the signing algorithm takes as input a (time) period tt as well the secre...
Certifying RSA Public Keys with an Efficient NIZK
RSA Trapdoor Permutations NIZK
font style='font-size:12px;'>
2018/1/17
In many applications, it is important to verify that an RSA public key (N,e) specifies a permutation, in order to prevent attacks due to adversarially-generated public keys. We design and implement a ...