AES based white box cryptography in digital signature verification

PK Shukla, A Aljaedi, PK Pareek, AR Alharbi, SS Jamal - Sensors, 2022 - mdpi.com
According to the standard paradigm, white box cryptographic primitives are used to block
black box attacks and protect sensitive information. This is performed to safeguard the …

Impact of computational power on cryptography

MI Bhat, KJ Giri - Multimedia Security: Algorithm Development, Analysis …, 2021 - Springer
From ancient times to modern digital era, one thing that never lost its importance is data.
Extensive efforts have been made by people to protect and secure data. Advancements in …

On the fog of RSA key lengths: Verifying public key cryptography strength recommendations

M Kiviharju - 2017 International Conference on Military …, 2017 - ieeexplore.ieee.org
Finite-field cryptography plays a major role in current cyberspace infrastructure. Most
notable examples include the RSA public key cryptosystem based on the assumed difficulty …

Use of SIMD-based data parallelism to speed up sieving in integer-factoring algorithms

B Sengupta, A Das - Applied Mathematics and Computation, 2017 - Elsevier
Many cryptographic protocols derive their security from the apparent computational
intractability of the integer factorization problem. Currently, the best known integer-factoring …

[PDF][PDF] Analyse des protocoles cryptographiques par les fonctions témoins.

J Fattahi - 2016 - academia.edu
Résumé Les protocoles cryptographiques constituent le cœur de la sécurité dans les
communications de tous genres. Ils assurent l'authentification des agents, la confidentialité …

The filtering step of discrete logarithm and integer factorization algorithms

C Bouvier - 2013 - inria.hal.science
The security of most current public-key cryptosystems is based on the difficulty of finding
discrete logarithms in large finite fields or factoring large integers. Most discrete logarithm …

Algorithmes pour la factorisation d'entiers et le calcul de logarithme discret

C Bouvier - 2015 - theses.hal.science
Dans cette thèse, nous étudions les problèmes de la factorisation d'entier et de calcul de
logarithme discret dans les corps finis. Dans un premier temps, nous nous intéressons à …

[PDF][PDF] Efficiency of RSA key factorization by open-source libraries and distributed system architecture

EJ Vuicik, D Šešok, S Ramanauskaitė - Baltic Journal of Modern …, 2017 - bjmc.lu.lv
The security of the RSA algorithm relies on the difficulty to factorize large numbers. However
the computational power of information technologies is increasing all the time, while open …

A survey of fermat factorization algorithms for factoring RSA composite numbers

K Balasubramanian, MP Pitchai - Multidisciplinary Science Journal, 2024 - malque.pub
In this research, we delve into the challenges associated with factorization in the context of
the RSA cryptosystem. The RSA cryptosystem's security relies on the computational …

A real life project in cryptography: assessment of RSA keys

R Aragona, F Gozzini, M Sala - … and Data-Link Security Techniques for …, 2016 - Springer
We describe a project carried out by CryptoLabTN. In this project we provide a rigorous
analysis of the RSA cryptographic keys employed in the Certification Authority (CA) to certify …