权威例句
Efficient Generation of Shared RSA Keys (Extended Abstract)
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
The exact security of digital signatures-how to sign with RSA and Rabin
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and C...