The Community for Technology Leaders
RSS Icon
Issue No.02 - February (1994 vol.43)
pp: 163-174
<p>The security, complexity, and application of two schemes for using an untrusted auxiliary processor to aid smart card RSA signature computations are reviewed, including detailed analysis of possible methods of attack. Guidance is given on practical, secure use of these schemes.</p>
computational complexity; smart cards; public key cryptography; server-aided; RSA; RSA signature computations; untrusted auxiliary processor; smart card; complexity; security; digital signature; modular exponentiation; server-aided computation.
J. Burns, C.J. Mitchell, "Parameter Selection for Server-Aided RSA Computation Schemes", IEEE Transactions on Computers, vol.43, no. 2, pp. 163-174, February 1994, doi:10.1109/12.262121
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool