RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryptionâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2010

Highly Cited

2010

- Thorsten Kleinjung, Kazumaro Aoki, +10 authors Paul Zimmermann
- CRYPTO
- 2010

This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discussesâ€¦Â (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated byâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- Dan Boneh, Matthew K. Franklin
- J. ACM
- 2001

We describe efficient techniques for a number of parties to jointly generate an RSA key. At the end of the protocol an RSAâ€¦Â (More)

Is this relevant?

Highly Cited

1997

Highly Cited

1997

- Rosario Gennaro, Hugo Krawczyk, Tal Rabin
- Journal of Cryptology
- 1997

We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work hasâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Paul C. Kocher
- CRYPTO
- 1996

By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellmanâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Mihir Bellare, Phillip Rogaway
- EUROCRYPT
- 1996

We describe an RSA-based signing scheme which combines essentially optimal e ciency with attractive security properties. Signingâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
- Journal of Cryptology
- 1996

We present two efficient protocols which implement robust threshold RSA signature schemes, where the power to sign is shared by Nâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter
- EUROCRYPT
- 1996

In this paper we present a new class of attacks against RSA with low encrypting exponent. The attacks enable the recovery ofâ€¦Â (More)

Is this relevant?

Highly Cited

1993

Highly Cited

1993

- Mark Shand, Jean Vuillemin
- IEEE Symposium on Computer Arithmetic
- 1993

We detail and analyse the critical techniques which may be combined in the design of fast hardware for RSA cryptography: chineseâ€¦Â (More)

Is this relevant?

Highly Cited

1990

Highly Cited

1990

- Michael J. Wiener
- IEEE Trans. Information Theory
- 1990

A cryptanalytic attack on the use of short RSA secret exponents is described. This attack makes use of an algorithm based onâ€¦Â (More)

Is this relevant?