Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

How to Fix Two RSA-Based PVSS Schemes—Exploration and Solution

From MaRDI portal
Publication:2907374
Jump to:navigation, search

DOI10.1007/978-3-642-31448-3_17zbMATH Open1308.94083OpenAlexW168484192MaRDI QIDQ2907374FDOQ2907374


Authors: Kun Peng, Matt Henricksen Edit this on Wikidata


Publication date: 7 September 2012

Published in: Information Security and Privacy (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-31448-3_17




Recommendations

  • Making RSA–PSS Provably Secure against Non-random Faults
  • Security in Communication Networks
  • Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
  • A new vulnerable class of exponents in RSA
  • Cryptanalysis of RSA with two decryption exponents
  • On double exponentiation for securing RSA against fault analysis
  • Partial key exposure: generalized framework to attack RSA
  • Partial key exposure attack on RSA -- improvements for limited lattice dimensions
  • Public Key Perturbation of Randomized RSA Implementations
  • Perturbating RSA Public Keys: An Improved Attack


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (1)

  • Modification and optimisation of an ElGamal-based PVSS scheme





This page was built for publication: How to Fix Two RSA-Based PVSS Schemes—Exploration and Solution

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2907374)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2907374&oldid=15873251"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 3 February 2024, at 20:11. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki