×

Found 10 Documents (Results 1–10)

Another look at affine-padding RSA signatures. (English) Zbl 1293.94061

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 22-32 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key compression and modulus switching for fully homomorphic encryption over the integers. (English) Zbl 1297.94062

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 446-464 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption over the integers with shorter public keys. (English) Zbl 1290.94059

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 487-504 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the RSA subgroup assumption from TCC 2005. (English) Zbl 1291.94070

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 147-155 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Factoring unbalanced moduli with known bits. (English) Zbl 1305.94035

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 65-72 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the broadcast and validity-checking security of pkcs#1 v1.5 encryption. (English) Zbl 1315.94054

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 1-18 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault attacks against EMV signatures. (English) Zbl 1274.94133

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 208-220 (2010).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical cryptanalysis of ISO/IEC 9796-2 and EMV signatures. (English) Zbl 1252.94055

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 428-444 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software