منابع مشابه
RSA–REACT: An Alternative to RSA–OAEP
The last few months, several new results appeared about the OAEP construction, and namely the RSA–OAEP cryptosystem. Whereas OAEP was believed to provide the highest security level (IND-CCA2), with an efficient exact security level, the effective security result had been showed to be incomplete. Nevertheless, the particular instantiation with RSA (which is anyway almost the sole application) ha...
متن کاملEffectiveness of Leukocyte Immunotherapy in Primary Recurrent Spontaneous Abortion (RSA)
Background: Recurrent spontaneous abortion (RSA) is defined as three or more se-quential abortions before the twentieth week of gestation. There are evidences to sup-port an allo-immunologic mechanism for RSA. One of the methods for treatment of RSA is leukocyte therapy; however there is still controversy about effectiveness of this method. Objectives: To evaluate the effectiveness of leukocyte...
متن کاملRSA { REACT : An Alternative to RSA {
The last few months, several new results appeared about the OAEP construction , and namely the RSA{OAEP cryptosystem. Whereas OAEP was believed to provide the highest security level (IND-CCA2), with an eecient exact security level, the eeective security result had been showed to be incomplete. Nevertheless, the particular instantiation with RSA (which is anyway almost the sole application) had ...
متن کاملImprovement in RSA Cryptosystem
Boneh and Shacham gave a nice survey on four variants (Batch RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA). Rebalanced RSA and MultiPower RSA were then combined to increase the decryption/signature generation performance. This combination theoretically improves the decryption/signature generation time about 14 times than RSA with CRT and about 56 times than the standard RSA with key size...
متن کاملNew vulnerabilities in RSA
Let N = pq be the product of two large unknown primes of equal bit-size. Wiener’s famous attack on RSA shows that using a public key (N, e) satisfying ed− k(N + 1− (p+ q)) = 1 with d < 1 3 N makes RSA completely insecure. The number of such weak keys can be estimated as N 1 4−ε. In this paper, we present a generalization of Wiener’s attack. We study two new classes of exponents satisfying an eq...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientia Militaria - South African Journal of Military Studies
سال: 2012
ISSN: 2224-0020,1022-8136
DOI: 10.5787/10-2-708