High-Order Attacks Against the Exponent Splitting Protection (English)
- New search for: Muller, F.
- New search for: Valette, F.
- New search for: Muller, F.
- New search for: Valette, F.
- New search for: Yung, Moti
In:
Public key cryptography; PKC 2006
3958
;
315-329
;
2006
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:High-Order Attacks Against the Exponent Splitting Protection
-
Contributors:
-
Conference:International conference; 9th, Public key cryptography; PKC 2006 ; 2006 ; New York, NY
-
Published in:Public key cryptography; PKC 2006 , 3958 ; 315-329LECTURE NOTES IN COMPUTER SCIENCE , 3958 ; 315-329
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , [London]
-
Publication date:2006-01-01
-
Size:15 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
New Attacks on RSA with Small Secret CRT-ExponentsBleichenbacher, D. / May, A. et al. | 2006
- 14
-
An Attack on a Modified Niederreiter Encryption SchemeWieschebrink, C. et al. | 2006
- 27
-
Cryptanalysis of an Efficient Proof of Knowledge of Discrete LogarithmKunz-Jacques, S. / Martinet, G. / Poupard, G. / Stern, J. et al. | 2006
- 44
-
Efficient Polynomial Operations in the Shared-Coefficients SettingMohassel, P. / Franklin, M. et al. | 2006
- 58
-
Generic On-Line/Off-Line Threshold SignaturesCrutchfield, C. / Molnar, D. / Turner, D. / Wagner, D. et al. | 2006
- 75
-
Linear Integer Secret Sharing and Distributed ExponentiationDamgard, I. / Thorbek, R. et al. | 2006
- 91
-
Encoding-Free ElGamal Encryption Without Random OraclesChevallier-Mames, B. / Paillier, P. / Pointcheval, D. et al. | 2006
- 105
-
Parallel Key-Insulated Public Key EncryptionHanaoka, G. / Hanaoka, Y. / Imai, H. et al. | 2006
- 123
-
Provably Secure Steganography with Imperfect SamplingLysyanskaya, A. / Meyerovich, M. et al. | 2006
- 140
-
Collision-Resistant No More: Hash-and-Sign Paradigm RevisitedMironov, I. et al. | 2006
- 157
-
Higher Order Universal One-Way Hash Functions from the Subset Sum AssumptionSteinfeld, R. / Pieprzyk, J. / Wang, H. et al. | 2006
- 174
-
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field SieveCommeine, A. / Semaev, I. et al. | 2006
- 191
-
Efficient Scalar Multiplication by Isogeny DecompositionsDoche, C. / Icart, T. / Kohel, D. R. et al. | 2006
- 207
-
Curve25519: New Diffie-Hellman Speed RecordsBernstein, D. J. et al. | 2006
- 229
-
Strongly Unforgeable Signatures Based on Computational Diffie-HellmanBoneh, D. / Shen, E. / Waters, B. et al. | 2006
- 241
-
Generalization of the Selective-ID Security Model for HIBE ProtocolsChatterjee, S. / Sarkar, P. et al. | 2006
- 257
-
Identity-Based Aggregate SignaturesGentry, C. / Ramzan, Z. et al. | 2006
- 274
-
On the Limitations of the Spread of an IBE-to-PKE TransformationKiltz, E. et al. | 2006
- 290
-
Inoculating Multivariate Schemes Against Differential AttacksDing, J. / Gower, J. E. et al. | 2006
- 302
-
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic ProtocolMyasnikov, A. / Shpilrain, V. / Ushakov, A. et al. | 2006
- 315
-
High-Order Attacks Against the Exponent Splitting ProtectionMuller, F. / Valette, F. et al. | 2006
- 330
-
New Online/Offline Signature Schemes Without Random OraclesKurosawa, K. / Schmidt-Samoa, K. et al. | 2006
- 347
-
Anonymous Signature SchemesYang, G. / Wong, D. S. / Deng, X. / Wang, H. et al. | 2006
- 364
-
The Power of Identification SchemesKurosawa, K. / Heng, S.-H. et al. | 2006
- 378
-
Security Analysis of KEA Authenticated Key Exchange ProtocolLauter, K. / Mityagin, A. et al. | 2006
- 395
-
SAS-Based Authenticated Key AgreementPasini, S. / Vaudenay, S. et al. | 2006
- 410
-
The Twist-AUgmented Technique for Key ExchangeChevassut, O. / Fouque, P.-A. / Gaudry, P. / Pointcheval, D. et al. | 2006
- 427
-
Password-Based Group Key Exchange in a Constant Number of RoundsAbdalla, M. / Bresson, E. / Chevassut, O. / Pointcheval, D. et al. | 2006
- 443
-
Conditional Oblivious CastChu, C.-K. / Tzeng, W.-G. et al. | 2006
- 458
-
Efficiency Tradeoffs for Malicious Two-Party ComputationMohassel, P. / Franklin, M. et al. | 2006
- 474
-
On Constructing Certificateless Cryptosystems from Identity Based EncryptionLibert, B. / Quisquater, J.-J. et al. | 2006
- 491
-
Building Better Signcryption Schemes with Tag-KEMsBjorstad, T. E. / Dent, A. W. et al. | 2006
- 508
-
Security-Mediated Certificateless CryptographyChow, S. S. M. / Boyd, C. / Nieto, J. M. G. et al. | 2006
- 525
-
k-Times Anonymous Authentication with a Constant Proving CostTeranishi, I. / Sako, K. et al. | 2006