• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 82
Next 10 →

Correcting Errors in RSA Private Keys

by Wilko Henecka, Er May, Er Meurer
"... Abstract. Let pk = (N, e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq, q −1 p). Assume that we obtain partial error-free information of sk, e.g., assume that we obtain half of the most significant bits of p. Then there are well-known algorithms to recover the full secret ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract. Let pk = (N, e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq, q −1 p). Assume that we obtain partial error-free information of sk, e.g., assume that we obtain half of the most significant bits of p. Then there are well-known algorithms to recover the full

Reconstruction and Error Correction of RSA Secret Parameters from the MSB Side

by Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra , 2011
"... Abstract. This paper discusses the factorization of the RSA modulus when some ‘partial information ’ about the bits of the RSA secret parameters are known. Heninger and Shacham (Crypto 2009) considered the reconstruction of RSA secret parameters from a few randomly known bits, and Henecka, May and M ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. This paper discusses the factorization of the RSA modulus when some ‘partial information ’ about the bits of the RSA secret parameters are known. Heninger and Shacham (Crypto 2009) considered the reconstruction of RSA secret parameters from a few randomly known bits, and Henecka, May

Partial Hiding in Public-Key Cryptography

by Eabhnat Ní Fhloinn, Michael Purser
"... Abstract. This paper explores the idea of exposing sections of the private key in public-key cryptosystems whose security is based on the intractability of factorising large integers, such as RSA. While substantial work has been done in the area of partial key exposure, the aim has been to investiga ..."
Abstract - Add to MetaCart
Abstract. This paper explores the idea of exposing sections of the private key in public-key cryptosystems whose security is based on the intractability of factorising large integers, such as RSA. While substantial work has been done in the area of partial key exposure, the aim has been

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes

by Pierre-louis Cayrel, Sidi Mohamed, El Yousfi Alaoui, Gerhrad Hoffmann, Pascal Véron
"... Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently propos ..."
Abstract - Add to MetaCart
proposed by Cayrel et al. in [14]. Our proposed scheme benefits of a performance gain as a result of the reduction in the soundness error from 2/3 for Stern’s scheme to 1/2 per round for the q-SD scheme. Our threshold ring signature scheme uses random linear codes over the field Fq, secure in the random

Contents

by Maxwell Krohn, Michael O. Rabin, Michael Mitzenmacher , 1999
"... 1.1 Private and Public Key Cryptography..................... 5 ..."
Abstract - Add to MetaCart
1.1 Private and Public Key Cryptography..................... 5

1Paranoid Secondary: Waterfilling in a Cognitive Interference Channel with Partial Knowledge

by Debashis Dash, Ashutosh Sabharwal
"... We study a two-user cognitive channel, where the primary flow is sporadic, cannot be re-designed and operating below its link capacity. To study the impact of primary traffic uncertainty, we propose a block activity model that captures the random on-off periods of primary’s transmissions. Each block ..."
Abstract - Add to MetaCart
block in the model can be split into parallel Gaussian-mixture channels, such that each channel resembles a multiple user channel (MAC) from the point of view of the secondary user. The secondary senses the current state of the primary at the start of each block. We show that the optimal power

Toffel: The Role of Organizational Scope and Governance in Strengthening Private Monitoring 1584

by Lamar Pierce , Michael W Toffel - 2013 INFORMS U.S. Environmental Protection Agency , 2007
"... G overnments and other organizations often outsource activities to achieve cost savings from market competition. Yet such benefits are often accompanied by poor quality resulting from moral hazard, which can be particularly onerous when outsourcing the monitoring and enforcement of government regul ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
referred to in the accounting literature as "audit shopping" (e.g., In private regulatory monitoring, which also spans three parties, the firm (the monitor), licensed by the state (the principal), may ignore or downplay observed violations and profit from side payments from the party

3esis Supervisor Accepted by

by Audio-based Localisation, Benjamin Christopher Dalton, V. Michael, Benjamin Christopher Dalton , 2005
"... in partial ful2llment of the requirements for the degree of ..."
Abstract - Add to MetaCart
in partial ful2llment of the requirements for the degree of

Cryptographic Voting Protocols A Prototype Design and Implementation for University Elections at TU Darmstadt

by Alexander Klink, Betreut Von Evangelos Karatsiolis, Technische Universität Darmstadt, Fachbereich Informatik, Fachgebiet Theoretische Informatik
"... I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant m ..."
Abstract - Add to MetaCart
remaing errors shall be blamed on me. • Andrea Peter for her love and for cheering me up when I was down. • Last but not least my parents, Jacqueline Herrnkind and Hans Peter Klink – without their love and continuous support, this thesis would never have been written.
Next 10 →
Results 1 - 10 of 82
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University