RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryptionâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2012

2012

- Alaa Al-Hamami, Ibrahem Abdallah Aldariseh
- 2012 International Conference on Advancedâ€¦
- 2012

This paper proposed enhancing the RSA algorithm through the use of additional third prime number in the composition of the publicâ€¦Â (More)

Is this relevant?

2011

2011

- Sachin Upadhyay
- 2011

The RSA cryptosystem is most widely used cryptosystem it may be used to provide both secrecy and digital signatures and itsâ€¦Â (More)

Is this relevant?

2005

2005

- Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen
- 19th International Conference on Advancedâ€¦
- 2005

This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most attractive andâ€¦Â (More)

Is this relevant?

2003

2003

- Cesar Alison Monteiro PaixÃ£o
- IACR Cryptology ePrint Archive
- 2003

We describe an efficient combination of two variants of the RSA cryptosystem (MPrime and Rebalanced RSA) analyzed by Boneh andâ€¦Â (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
- Journal of Cryptology
- 2000

Recently Victor Shoup noted that there is a gap in the widely believed security result of OAEP against adaptive chosen-ciphertextâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

In this paper, we propose a new algorithm based on Montgomeryâ€™s algorithm to calculate modular multiplication that is the coreâ€¦Â (More)

Is this relevant?

Review

1998

Review

1998

- Dan Boneh
- 1998

Introduction The RSA cryptosystem, invented by Ron Rivest, Adi Shamir, and Len Adleman [18], was first publicized in the Augustâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Paul C. Kocher
- CRYPTO
- 1996

By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellmanâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Oded Goldreich, Shafi Goldwasser, Shai Halevi
- CRYPTO
- 1996

We present a new proposal for a trapdoor one-way function, from which we derive public-key encryption and digital signatures. Theâ€¦Â (More)

Is this relevant?

1987

1987

- Achim Jung
- Computers & Security
- 1987

Techniques for a software implementation of the RSA cryptosystem are presented. They allow both space and time requirements ofâ€¦Â (More)

Is this relevant?