Sign in
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.
Willy Susilo
Joseph Tonien
Guomin Yang
Published in:
ACISP (2019)
Keyphrases
</>
upper bound
lower bound
power analysis
worst case
public key
key exchange
neural network
brute force
additive noise
authentication protocol
lightweight
countermeasures
data corruption