Attacks on weak implementations of RSA
RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. Since then, researchers and c...
Main Author: | Kok, Zi Ming |
---|---|
Other Authors: | Tay Kian Boon |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/148138 |
Similar Items
-
Weak implementation of RSA algorithm
by: Lim, Si Yi
Published: (2023) -
Tool kits for attacks on RSA
by: Wang, Xu.
Published: (2011) -
SSL-TLS security flaw : a study of the RSA "freak" attack
by: Low, John Kah Yong
Published: (2020) -
Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
by: Yue, Shiqi
Published: (2022) -
Examples of weak AES implementation and attacks against them
by: Yeap, Ernest Zong Han
Published: (2022)