搜索结果: 1-5 共查到“军事学 RSA key generation”相关记录5条 . 查询时间(0.109 秒)
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
digital signatures distributed cryptography implementation
font style='font-size:12px;'>
2019/2/27
Migration of security applications to the cloud poses unique challenges in key management and protection: asymmetric keys which would previously have resided in tamper-resistant, on-premise Hardware S...
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
cryptographic protocols RSA
font style='font-size:12px;'>
2018/6/7
We present two new, highly efficient, protocols for securely generating a distributed RSA key pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously secure. Both...
Cache-Timing Attacks on RSA Key Generation
applied cryptography public key cryptography RSA
font style='font-size:12px;'>
2018/4/25
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
cryptographic protocols / Secure Two-Party Computation RSA Generation Threshold Encryption Scheme Paillier
font style='font-size:12px;'>
2012/3/26
The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is t...
Simple Backdoors for RSA Key Generation
Simple Backdoors RSA Key Generation
font style='font-size:12px;'>
2009/4/15
We present extremely simple ways of embedding a backdoor
in the key generation scheme of RSA. Three of our schemes generate
two genuinely random primes p and q of a given size, to obtain their
publ...