The Community for Technology Leaders
Green Image
<p>The security, complexity, and application of two schemes for using an untrusted auxiliary processor to aid smart card RSA signature computations are reviewed, including detailed analysis of possible methods of attack. Guidance is given on practical, secure use of these schemes.</p>
computational complexity; smart cards; public key cryptography; server-aided; RSA; RSA signature computations; untrusted auxiliary processor; smart card; complexity; security; digital signature; modular exponentiation; server-aided computation.
J. Burns, C.J. Mitchell, "Parameter Selection for Server-Aided RSA Computation Schemes", IEEE Transactions on Computers, vol. 43, no. , pp. 163-174, February 1994, doi:10.1109/12.262121
110 ms
(Ver 3.3 (11022016))