搜索结果: 1-7 共查到“密码学 RSA signatures”相关记录7条 . 查询时间(0.062 秒)
We would like to compute RSA signatures with the help of a Hardware Security Module (HSM). But what can we do when we want to use a certain public exponent that the HSM does not allow or support? Surp...
On the Instantiability of Hash-and-Sign RSA Signatures
RSA Signature Hash-and-Sign Full Domain Hash Random Oracle Heuristic Generic Groups Black-Box Reductions
2012/3/29
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the only existing analysi...
It is well-known that, due to the homomorphic properties of the RSA function, textbook RSA signatures are insecure, and a common workaround is to encode messages with a so-called padding function mu b...
On the (In)Security of RSA Signatures
RSA Signature Full Domain Hash Random Oracle Heuristic Generic Groups Black-Box Reductions
2011/3/10
Bellare and Rogaway [ACM CCS ’93] introduced the famous random oracle model as a
“paradigm for designing efficient protocols”. This paradigm has led to several highly efficient
and widely used in pr...
Fault Resistant RSA Signatures:Chinese Remaindering in Both Directions
Diffierential Fault Analysis RSA Chinese Remainder Theorem
2010/2/1
Fault attacks are one of the most severe attacks against secure embed-
ded cryptographic implementations. Block ciphers such as AES, DES or
public key algorithms such as RSA can be broken with as fe...
Fault Attacks on RSA Signatures with Partially Unknown Messages
Fault attacks digital signatures rsa
2009/7/14
Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices.
In the late 90’s, Boneh, DeMillo and Lipton [6] introduced fault-based attacks on crt-rsa. These attac...
Attacking LCCC Batch Verification of RSA Signatures
batch verification digital signatures RSA
2008/11/10
Batch verification of digital signatures is used to improve
the computational complexity when large number of digital signatures
must be verified. Lee at al. [2] proposed a new method to identify ba...