SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Bao-Dong Qin, Ming Li, Fan-Yu Kong. Cryptanalysis of a Type of CRT-Based RSA Algorithms[J]. Journal of Computer Science and Technology, 2008, 23(2): 214-221. |
[1] |
Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for fault. In -\it Proc. EUROCRYPT'97}, Konstanz, Germany, Springer-Verlag, 1997, pp.37--51.
|
[2] |
Christian Aum\"-u}ller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In -\it Proc. CHES'02}, Redwood Shores, USA, August 13--15, 2002, pp.260--275.
|
[3] |
Bar-El H, Choukri H, Naccache D, Tunstall M, Whelan C. The sorcerer's apprentice guide to fault attacks. In -\it Proc. Workshop on Fault Detection and Tolerance in Cryptography}, Florence, Italy, June 2004.
|
[4] |
Couvreur C, Quisquater J. Fast decipherment algorithm for RSA public-key cryptosystem. -\it Electronic Letters}, 1982, 18(21): 905--907.
|
[5] |
Yen S, Kim S, Lim S, Moon S. RSA Speedup with Chinese remainder theorem immune against hardware fault Cryptanalysis. -\it IEEE Transactions on Computers}, April 2003, 52: 461--472.
|
[6] |
Ross J Anderson, Markus G Kuhn. Low cost attacks on tamper resistant devices. In -\it Proc. 5th International Workshop on Security Protocols}, Paris, France, April 07--09, 1997, pp.125--136.
|
[7] |
Skorobogatov S, Anderson R. Optical fault induction attacks. In -\it Proc. Workshop on Cryptographic Hardware and Embedded Systems}, Hotel Sofitel, San Francisco Bay (Redwood City), USA, August 13--15, 2002.
|
[8] |
Bellcore Press Release. New threat model breaks crypto codes. Sept. 1996, http://www.bellcore.com/PRESS/ADVS\-RY96/facts.html.
|
[9] |
Ciet M, Joye M. Practical fault countermeasures for Chinese remaindering based RSA. In -\it Proc. FDTC'05}, Edinburgh, Scotland, September 2, 2005, pp.124--131.
|
[10] |
Johannes Bl\"-o}mer, Martin Otto. Wagner's attack on a secure CRT-RSA algorithm reconsidered. In -\it Proc. FDTC'06}, Yokohama, Japan, Springer-Verlag, 2006, pp.13--23.
|
[11] |
Shamir A. Method and apparatus for protecting public key schemes from timing and fault attacks. United States Patent, No. 5991415, Nov. 23, 1999.
|
[12] |
Joye M, Lenstra A K, Quisquater J J. Chinese remaindering based cryptosystems in the presence of faults. -\it Journal of Cryptology}, 1999, 12(4): 241--245.
|
[13] |
Johannes Bl\"-o}mer, Martin Otto, Jean-Pierre Seifert. A new CRT-RSA algorithm secure against bellcore attacks. In -\it Proc. 10th ACM Conference on Computer and Communications Security}, Washington D.C., USA, October 27--30, 2003, pp.311--320.
|
[14] |
Ming Li, Baodong Qin, Fanyu Kong, Daxing Li. Further cryptanalysis of a CRT-RSA algorithm at CCS 2003. In -\it Proc. International Workshop on Network and System Security}, Dalian, China, Sept. 18--21, 2007, pp.72--76.
|
[15] |
Sining Liu, Brian King, Wei Wang. A CRT-RSA algorithm secure against hardware fault attacks. In -\it Proc. DASC'06}, Indianapolis, USA, 2006, pp.51--66.
|
[16] |
David Wagner. Cryptanalysis of a provably secure CRT-RSA algorithm. In -\it Proc. the 11th ACM Conference on Computer and Communications Security}, Washington DC, USA, October 25--29, 2004, pp.92--97.
|
[17] |
Coppersmith D. Finding a small root of a univariate modular equation. In -\it Proc. EUROCRYPT'96}, Saragossa, Spain, Springer-Verlag, 1996, pp.155--165.
|
[18] |
Coppersmith D. Finding a small root of a bivariate integer equation. In -\it Proc. EUROCRYPT'96}, Saragossa, Spain, Springer-Verlag, 1996, pp.178--189.
|
[19] |
Coppersmith D. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. -\it Journal of Cryptology}, 1997, 10: 233--260.
|
[20] |
Howgrave-Graham N. Finding small roots of univariate modular equations revisited. In -\it Proc. Cryptography and Coding}, Cirencester, UK, Springer-Verlag, 1997, pp.131--142.
|
[21] |
A Lenstra, H Lenstra, Jr., L Lov\,-a}sz. Factoring polynomials with rational coefficients. -\it Mathematische Ann}, 1982, 261: 513--534.
|
[22] |
Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1997.
|
[23] |
Bellare M, Rogaway P. Optimal asymmetric encryption. In -\it Proc. EUROCRYPT'94}, Springer-Verlag, Berlin, 1995, pp.92--111.
|
[1] | Ming-Cong Ma, Lu Wang, Yan-Ning Xu, Xiang-Xu Meng. Unsupervised Reconstruction for Gradient-Domain Rendering with Illumination Separation[J]. Journal of Computer Science and Technology, 2024, 39(6): 1281-1291. DOI: 10.1007/s11390-024-3142-4 |
[2] | Chun-Meng Kang, Lu Wang, Yan-Ning Xu, Xiang-Xu Meng, Yuan-Jie Song. Adaptive Photon Mapping Based on Gradient[J]. Journal of Computer Science and Technology, 2016, 31(1): 217-224. DOI: 10.1007/s11390-016-1622-x |
[3] | Yu Zang, Hua Huang, Chen-Feng Li. Stroke Style Analysis for Painterly Rendering[J]. Journal of Computer Science and Technology, 2013, 28(5): 762-775. DOI: 10.1007/s11390-013-1375-8 |
[4] | Xiao-Hui Liang, Shang Ma, Li-Xia Cen, Zhuo Yu. Light Space Cascaded Shadow Maps Algorithm for Real Time Rendering[J]. Journal of Computer Science and Technology, 2011, 26(1): 176-186. DOI: 10.1007/s11390-011-1120-0 |
[5] | Jun Teng, Marc Jaeger, Bao-Gang Hu. A Fast Ambient Occlusion Method for Real-Time Plant Rendering[J]. Journal of Computer Science and Technology, 2007, 22(6): 859-866. |
[6] | CHEN Wei, HUA Wei, BAO HuJun, PENG QunSheng. Real-Time Ray Casting Rendering of Volume Clipping in Medical Visualization[J]. Journal of Computer Science and Technology, 2003, 18(6). |
[7] | Tong Xin, Tang Zesheng. Hardware Assisted Fast Volume Rendering with Boundary Enhancement[J]. Journal of Computer Science and Technology, 1998, 13(5): 393-401. |
[8] | Li Bin, Liang Xundong, Liu Shenquan. A Surface Rendering Approach in 3D Rectilinear Datafield[J]. Journal of Computer Science and Technology, 1998, 13(3): 220-227. |
[9] | Cai Wenli, Shi Jiaoying. Composed Scattering Model for Direct Volume Rendering[J]. Journal of Computer Science and Technology, 1996, 11(5): 433-442. |
[10] | Huang Wenqi, Wang Gangqiang. A Basic Algorithm for Computer-Aided Design of Material Arrangement[J]. Journal of Computer Science and Technology, 1992, 7(1): 56-61. |