A New Attack on Three Variants of the RSA Cryptosystem.
Martin W. BunderAbderrahmane NitajWilly SusiloJoseph TonienPublished in: ACISP (2) (2016)
Keyphrases
- power analysis
- elliptic curve
- private key
- secret key
- public key
- ciphertext
- countermeasures
- smart card
- encryption algorithm
- public key cryptosystem
- elliptic curve cryptography
- authentication protocol
- cellular automata
- scalar multiplication
- security analysis
- encryption scheme
- information security
- image encryption
- diffie hellman
- public key cryptosystems
- key exchange protocol
- key distribution
- block cipher
- digital signature
- signature scheme
- authentication scheme
- attack scenarios
- pseudorandom
- chaotic maps