-
-
[分享]好文章閱讀系列 --- 英文版 RSA 相關論文
-
发表于: 2009-11-14 15:35 5760
-
A practical t-n threshold proxy signature scheme based on the RSA cryptosystem.pdf (306.1 KB)
Batch verifying multiple RSA digital signatures.pdf (280.8 KB)
Blocking method for RSA cryptosystem without expanding cipher length.pdf (185.8 KB)
Comment on `Blocking method for RSA cryptosystem without expanding cipher length'.pdf (197.9 KB)
Computer security-Implementation of fast RSA key generation on smart cards.pdf (630.7 KB)
Cryptanalysis of short RSA secret exponents.pdf (382.2 KB)
Digital signatures with RSA and other public-key cryptosystems.pdf (365.6 KB)
Efficient generation of shared RSA keys.pdf (198.2 KB)
Emerging applications--A new CRT-RSA algorithm secure against bellcore attacks.pdf (299.8 KB)
Experimental performance of shared RSA modulus generation.pdf (225.6 KB)
Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian integers.pdf (358.1 KB)
Integrated approach for fault tolerance and digital signature in RSA.pdf (355.5 KB)
Multi-round passive attacks on server-aided RSA protocols.pdf (229.2 KB)
On the cryptographic security of single RSA bits.pdf (682.8 KB)
RSA cryptosystem design based on the Chinese remainder theorem.pdf (146.3 KB)
Signature schemes based on the strong RSA assumption-1.pdf (518.5 KB)
Signature schemes based on the strong RSA assumption.pdf (164.6 KB)
The security of all RSA and discrete log bits.pdf (304.6 KB)
An asynchronous protocol for distributed computation of RSA inverses and its applications.rar (1.08 MB)
Robust efficient distributed RSA-key generation.rar (1.27 MB)
Batch verifying multiple RSA digital signatures.pdf (280.8 KB)
Blocking method for RSA cryptosystem without expanding cipher length.pdf (185.8 KB)
Comment on `Blocking method for RSA cryptosystem without expanding cipher length'.pdf (197.9 KB)
Computer security-Implementation of fast RSA key generation on smart cards.pdf (630.7 KB)
Cryptanalysis of short RSA secret exponents.pdf (382.2 KB)
Digital signatures with RSA and other public-key cryptosystems.pdf (365.6 KB)
Efficient generation of shared RSA keys.pdf (198.2 KB)
Emerging applications--A new CRT-RSA algorithm secure against bellcore attacks.pdf (299.8 KB)
Experimental performance of shared RSA modulus generation.pdf (225.6 KB)
Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian integers.pdf (358.1 KB)
Integrated approach for fault tolerance and digital signature in RSA.pdf (355.5 KB)
Multi-round passive attacks on server-aided RSA protocols.pdf (229.2 KB)
On the cryptographic security of single RSA bits.pdf (682.8 KB)
RSA cryptosystem design based on the Chinese remainder theorem.pdf (146.3 KB)
Signature schemes based on the strong RSA assumption-1.pdf (518.5 KB)
Signature schemes based on the strong RSA assumption.pdf (164.6 KB)
The security of all RSA and discrete log bits.pdf (304.6 KB)
An asynchronous protocol for distributed computation of RSA inverses and its applications.rar (1.08 MB)
Robust efficient distributed RSA-key generation.rar (1.27 MB)
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!
赞赏
他的文章
- [转帖][Cado-nfs-discuss] 795-bit factoring and discrete logarithms (RSA-240 于2019年12月2日被破解) 19498
- [转帖]How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits 8162
- [推荐]RSA-220 has 220 decimal digits (729 bits), and was factored 6895
- [推荐]RSA-210 has been factored. 11179
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks... 8923
看原图
赞赏
雪币:
留言: