Sign in

The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.

Willy SusiloJoseph TonienGuomin Yang
Published in: ACISP (2019)
Keyphrases
  • upper bound
  • lower bound
  • power analysis
  • worst case
  • public key
  • key exchange
  • neural network
  • brute force
  • additive noise
  • authentication protocol
  • lightweight
  • countermeasures
  • data corruption