Mitchell, C. J. and Burns, J. (1994) Parameter Selection for Server-Aided RSA Computation Schemes. IEEE Transactions on Computers, 43 (2).
Full text access: Open
The security, complexity, and application of two schemes for using an untrusted auxiliary processor to aid smart card RSA signature computations are reviewed, including detailed analysis of possible methods of attack. Guidance is given on practical, secure use of these schemes.
This is a Submitted version This version's date is: 2/1994 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/82916fe7-91a9-969b-ecc9-6cc80410a0a1/2/
Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012
© 1994 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.