Attacks on systems using Chinese remaindering
暂无分享,去创建一个
[1] Peter J. Smith,et al. LUC: A New Public Key System , 1993, SEC.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Arjen K. Lenstra. Memo on RSA signature generation in the presence of faults , 1996 .
[4] N. Demytko,et al. A New Elliptic Curve Based Analogue of RSA , 1994, EUROCRYPT.
[5] Tatsuaki Okamoto,et al. New Public-Key Schemes Based on Elliptic Curves over the Ring Zn , 1991, CRYPTO.
[6] Robert H. Deng,et al. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults , 1997, Security Protocols Workshop.
[7] Richard J. Lipton,et al. On the Importance of Checking Computations , 1996 .