Back to Results
First PageMeta Content
Key management / RSA / Cryptanalysis / Data Encryption Standard / Block cipher / Differential cryptanalysis / Eli Biham / Timing attack / Digital signature / Cryptography / Public-key cryptography / Electronic commerce


Document Date: 2000-03-07 12:00:00


Open Document

File Size: 139,53 KB

Share Result on Facebook

City

Redwood City / /

Company

Fiat / RSA Data Security Inc. / RSA Laboratories / Bulletin RSA Laboratories / re- R S A / /

Country

United States / /

/

Facility

National Institute of Standards and Technology / /

IndustryTerm

security applications / secure tamperproof hardware / unknown encryption algorithm / software engineers / certain cryptographic algorithms / cryptographic processing / security systems / secure hardware / divisor algorithm / secure processing / good algorithms / cryptographic protocols / software simulation / cryptographic hardware / tamper-resistant hardware / tamper-resistant processing / electronic devices / cryptographic devices / cryptographic device / encryption algorithm / brute-force key search attack / /

Organization

U.S. government / National Institute of Standards and Technology / /

Person

Richard Lipton / Rabin / Dan Boneh / Paul Kocher / Adi Shamir / Richard DeMillo / Eli Biham / Matthew Robshaw / Mihir Bellare / Jean-Jacques Quisquater / David Naccache / Burt Kaliski / Phil Rogaway / /

/

Position

chief scientist / principal research scientist / /

ProgrammingLanguage

L / J / /

ProvinceOrState

California / /

PublishedMedium

Journal of Cryptology / Lecture Notes in Computer Science / /

Technology

encryption algorithm / block cipher / unknown encryption algorithm / smart card / certain cryptographic algorithms / private key / secret key / operating system / encryption / cryptography / just good algorithms / Instead successive encryptions / divisor algorithm / simulation / /

URL

http /

SocialTag