Weak implementation of RSA algorithm
The objective of this project is to research on the mathematical algorithms and investigate the various weak implementation that an attacker may use to attack the RSA algorithm. For this project, the focus will be on weak implementations of RSA instead of side channel attacks where the attackers...
Main Author: | Lim, Si Yi |
---|---|
Other Authors: | Tay Kian Boon |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166102 |
Similar Items
-
Concurrent factorization of RSA moduli via weak key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024) -
SSL-TLS security flaw : a study of the RSA "freak" attack
by: Low, John Kah Yong
Published: (2020) -
Implementation of depth estimation algorithm for smartphone camera
by: Ton, Luong Hoa
Published: (2015) -
Adaptive filtering : implementation of algorithms on embedded processor
by: Lim, Keegan Tien Choon.
Published: (2010) -
FPGA implementation of turbo decoders with various decoding algorithms
by: Lu, Shanguo.
Published: (2008)