Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
8
views
27
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,411
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security : 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings
RSA Key Recovery from Digit Equivalence Information
other
Author(s):
Chitchanok Chuengsatiansup
,
Andrew Feutrill
,
Rui Qi Sim
,
Yuval Yarom
Publication date
(Online):
June 18 2022
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Management Information Systems
Most cited references
27
Record
: found
Abstract
: not found
Article
: not found
A method for obtaining digital signatures and public-key cryptosystems
R. L. Rivest
,
A Shamir
,
L Adleman
(1978)
0
comments
Cited
385
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Power Analysis
Paul Köcher
,
Joshua Jaffe
,
Benjamin Jun
(1999)
0
comments
Cited
143
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Paul Kocher
(1996)
0
comments
Cited
79
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2022
Publication date (Online):
June 18 2022
Pages
: 193-211
DOI:
10.1007/978-3-031-09234-3_10
SO-VID:
dde2f44a-d729-4aa0-b9a5-a6946e88c56d
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation
pp. 24
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
pp. 45
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
pp. 67
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
pp. 85
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
pp. 105
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes
pp. 126
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
pp. 147
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques
pp. 170
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge
pp. 193
RSA Key Recovery from Digit Equivalence Information
pp. 212
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
pp. 230
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
pp. 253
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
pp. 273
Improving the Privacy of Tor Onion Services
pp. 293
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
pp. 313
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
pp. 337
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception
pp. 356
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol
pp. 376
Probing for Passwords – Privacy Implications of SSIDs in Probe Requests
pp. 399
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking
pp. 419
Don’t Tamper with Dual System Encryption
pp. 440
Progressive and Efficient Verification for Digital Signatures
pp. 459
Revocable Hierarchical Attribute-Based Signatures from Lattices
pp. 480
Covert Authentication from Lattices
pp. 501
Spreading the Privacy Blanket:
pp. 521
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
pp. 542
(Commit-and-Prove) Predictable Arguments with Privacy
pp. 565
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
pp. 585
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
pp. 605
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
pp. 626
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security
pp. 643
Efficient Two-Party Exponentiation from Quotient Transfer
pp. 663
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
pp. 684
How Byzantine is a Send Corruption?
pp. 707
Babel Fees via Limited Liabilities
pp. 727
FAST: Fair Auctions via Secret Transactions
pp. 748
Astrape: Anonymous Payment Channels with Boring Cryptography
pp. 771
A White-Box Speck Implementation Using Self-equivalence Encodings
pp. 792
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
pp. 809
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher
pp. 833
Carry-Less to BIKE Faster
pp. 853
Faster Kyber and Dilithium on the Cortex-M4
pp. 872
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices
pp. 892
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Similar content
1,411
Photonic side channel attacks against RSA
Authors:
E Carmon
,
J.-P. Seifert
,
A. Wool
Efficient RSA key generation and threshold paillier in the two-party setting
Authors:
C Hazay
,
G. Mikkelsen
,
T Rabin
…
Migration patterns of acetabular cups: a systematic review and meta-analysis of RSA studies
Authors:
Chan Hee CHO
,
Bart G PIJLS
,
John M ABRAHAMS
…
See all similar