Abstract
We present some observations on public-key cryptosystems that use the Chinese remaindering algorithm. Our results imply that careless implementations of such systems could be vulnerable. Only one faulty signature, in some explained context, is enough to recover the secret key. © 1999 International Association for Cryplologic Research.
Author supplied keywords
Cite
CITATION STYLE
APA
Joye, M., Lenstra, A. K., & Quisquater, J. J. (1999). Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology, 12(4), 241–245. https://doi.org/10.1007/s001459900055
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free