LUGKRAG IN DIE RSA

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RSA–REACT: An Alternative to RSA–OAEP

The last few months, several new results appeared about the OAEP construction, and namely the RSA–OAEP cryptosystem. Whereas OAEP was believed to provide the highest security level (IND-CCA2), with an efficient exact security level, the effective security result had been showed to be incomplete. Nevertheless, the particular instantiation with RSA (which is anyway almost the sole application) ha...

متن کامل

Effectiveness of Leukocyte Immunotherapy in Primary Recurrent Spontaneous Abortion (RSA)

Background: Recurrent spontaneous abortion (RSA) is defined as three or more se-quential abortions before the twentieth week of gestation. There are evidences to sup-port an allo-immunologic mechanism for RSA. One of the methods for treatment of RSA is leukocyte therapy; however there is still controversy about effectiveness of this method. Objectives: To evaluate the effectiveness of leukocyte...

متن کامل

RSA { REACT : An Alternative to RSA {

The last few months, several new results appeared about the OAEP construction , and namely the RSA{OAEP cryptosystem. Whereas OAEP was believed to provide the highest security level (IND-CCA2), with an eecient exact security level, the eeective security result had been showed to be incomplete. Nevertheless, the particular instantiation with RSA (which is anyway almost the sole application) had ...

متن کامل

Improvement in RSA Cryptosystem

Boneh and Shacham gave a nice survey on four variants (Batch RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA). Rebalanced RSA and MultiPower RSA were then combined to increase the decryption/signature generation performance. This combination theoretically improves the decryption/signature generation time about 14 times than RSA with CRT and about 56 times than the standard RSA with key size...

متن کامل

New vulnerabilities in RSA

Let N = pq be the product of two large unknown primes of equal bit-size. Wiener’s famous attack on RSA shows that using a public key (N, e) satisfying ed− k(N + 1− (p+ q)) = 1 with d < 1 3 N makes RSA completely insecure. The number of such weak keys can be estimated as N 1 4−ε. In this paper, we present a generalization of Wiener’s attack. We study two new classes of exponents satisfying an eq...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scientia Militaria - South African Journal of Military Studies

سال: 2012

ISSN: 2224-0020,1022-8136

DOI: 10.5787/10-2-708