How to Fix Two RSA-Based PVSS Schemes—Exploration and Solution
From MaRDI portal
Publication:2907374
DOI10.1007/978-3-642-31448-3_17zbMATH Open1308.94083OpenAlexW168484192MaRDI QIDQ2907374FDOQ2907374
Authors: Kun Peng, Matt Henricksen
Publication date: 7 September 2012
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-31448-3_17
Recommendations
- Making RSA–PSS Provably Secure against Non-random Faults
- Security in Communication Networks
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
- A new vulnerable class of exponents in RSA
- Cryptanalysis of RSA with two decryption exponents
- On double exponentiation for securing RSA against fault analysis
- Partial key exposure: generalized framework to attack RSA
- Partial key exposure attack on RSA -- improvements for limited lattice dimensions
- Public Key Perturbation of Randomized RSA Implementations
- Perturbating RSA Public Keys: An Improved Attack
Cited In (1)
This page was built for publication: How to Fix Two RSA-Based PVSS Schemes—Exploration and Solution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2907374)