Cryptanalysis of the RSA Algorithm Under a System Distributed Using SBC Devices
暂无分享,去创建一个
[1] Xin Zhou,et al. Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.
[2] Al-Sakib Khan Pathan,et al. BLOCK CIPHER TA N V EER AHM ED, MOH AMMADA BU LKA SH E M, AND SA IFULAZAD , 2014 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[5] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[6] Filippo Melzani,et al. Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[7] Arjen K. Lenstra,et al. Factorization of a 768-Bit RSA Modulus , 2010, CRYPTO.
[8] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .