RSA

Known as: Rivest Shamir Adleman, Rivest-Shamir-Adleman, Rsa encryption 
RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1978-2018
020040019782018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses… (More)
  • table 1
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We describe efficient techniques for a number of parties to jointly generate an RSA key. At the end of the protocol an RSA… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work has… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellman… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We describe an RSA-based signing scheme which combines essentially optimal e ciency with attractive security properties. Signing… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We present two efficient protocols which implement robust threshold RSA signature schemes, where the power to sign is shared by N… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1996
Highly Cited
1996
In this paper we present a new class of attacks against RSA with low encrypting exponent. The attacks enable the recovery of… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We detail and analyse the critical techniques which may be combined in the design of fast hardware for RSA cryptography: chinese… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1990
Highly Cited
1990
A cryptanalytic attack on the use of short RSA secret exponents is described. This attack makes use of an algorithm based on… (More)
Is this relevant?