Sign in

On an attack on RSA with small CRT-exponents.

Lidong HanXiaoyun WangGuangwu Xu
Published in: Sci. China Inf. Sci. (2010)
Keyphrases
  • small number
  • power analysis
  • neural network
  • database systems
  • countermeasures
  • social networks
  • image processing
  • decision trees
  • case study
  • power law
  • secret key