Back to Results
First PageMeta Content
Public-key cryptography / Computer arithmetic / Electronic commerce / RSA / Paillier cryptosystem / Modular exponentiation / Exponentiation by squaring / Chinese remainder theorem / Montgomery reduction / Cryptography / Mathematics / Modular arithmetic


A Method for Preventing "Skipping" Attacks
Add to Reading List

Document Date: 2012-06-05 18:18:05


Open Document

File Size: 380,29 KB

Share Result on Facebook

City

Konstanz / Taipei / /

Company

IEEE Press / Cryptographic Hardware / Security & Content Protection Labs / Embedded Systems / /

Country

Taiwan / Germany / /

/

Event

Product Issues / /

IndustryTerm

exponentiation algorithms / algebraic / exclusiveOR operator / decipherment algorithm / mode using low-cost equipment / similar algorithms / exponentiation algorithm / similar algorithm / /

Person

Marc Joye / Belle Fontaine / /

Product

value / signatures / signature / /

PublishedMedium

Communications of the ACM / Journal of Cryptology / Lecture Notes in Computer Science / /

Technology

same exponentiation algorithm / return R0 Algorithm / decipherment algorithm / Cryptography / exponentiation algorithms / Smart Card / following algorithm / exponentiation algorithm / digital signature / underlying exponentiation algorithm / performed using the same exponentiation algorithm / /

SocialTag