Secure acceleration of DSS signatures using insecure server (0)

Cached

Download Links

by Philippe Béguin , Jean-Jacques Quisquater
Venue:in Asiacrypt'94
Citations:4 - 1 self

Active Bibliography

22 Fast Server-Aided RSA Signatures Secure Against Active Attacks – Philippe Béguin, Jean-Jacques Quisquater - 1995
19 The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure – Phong Nguyen, Jacques Stern - 1998
Active Trial-and-error Attack on SASC Protocols Abstract – Heeyoul Kim, Younho Lee, Seong-min Hong, Hyunsoo Yoon - 2005
5 Speeding up Exponentiation using an Untrusted Computational Resource – Dwaine Clarke, Srinivas Devadas, Marten Van Dijk, Blaise Gassend, G. Edward Suh - 2003
8 Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes – Claude Castelluccia, Einar Mykletun, Gene Tsudik - 2005
Methods of Speeding Up Secret Computations With Insecure Auxiliary Computer – Yerzhan N. Seitkulov
17 Security and Performance of Server-Aided RSA Computation Protocols – Chae Hoon Lim, Pil Joong Lee - 1995
2 Server(Prover/Signer)-Aided Verification of Identity Proofs and Signatures – Chae Hoon Lim, Pil Joong Lee - 1995
20 Secure outsourcing of scientific computations – Mikhail J. Atallah, K. N. Pantazopoulos, John R. Rice, Eugene H. Spafford - 1998
12 An Attack on Server Assisted Authentication Protocols – R.J. Anderson - 1992
2 On the Insecurity of Some Server-Aided RSA Protocol – Phong Q. Nguyen, Igor E. Shparlinski
4 On the insecurity of a server-aided RSA protocol – Phong Q. Nguyen, Igor E. Shparlinski - 2001
7 On the security of server-aided RSA protocols – Johannes Merkle, Ralph Werchner - 1998
2 Accelerating Key Establishment Protocols for Mobile Communication – Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun Cho - 2001
8 A New Approach to Server-Aided Secret Computation – Seong-Min Hong, Jun-bum Shin, H. Lee-kwang, Hyunsoo Yoon - 1998
8 Multi-Round Passive Attacks on Server-Aided RSA Protocols – Johannes Merkle - 2000
1 Secure outsourcing of some computations – Mikhail J. Atallah , Konstantinos N. Pantazopoulos, Eugene H. Spafford - 1996
20 SECURE OUTSOURCING OF SEQUENCE COMPARISONS – Mikhail Atallah, Jiangtao Li
Pushing the Limits of Formal Verification – Michael Backes, Matthias Schunter