Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli.
Colin D. WalterPublished in: CT-RSA (2002)
Keyphrases
- public key cryptosystems
- key distribution
- modular exponentiation
- elliptic curve
- diffie hellman
- secret key
- elliptic curve cryptography
- key exchange
- wireless sensor networks
- key management
- encryption scheme
- fault tolerant
- authentication scheme
- secure communication
- upper bound
- group communication
- private key
- lower bound
- signature scheme
- smart card
- worst case
- integer arithmetic
- authentication protocol
- digital signal processing
- lightweight