First Page | Meta Content | |
---|---|---|
Document Date: 2000-03-07 12:00:00Open Document File Size: 139,53 KBShare Result on FacebookCityRedwood City / /CompanyFiat / RSA Data Security Inc. / RSA Laboratories / Bulletin RSA Laboratories / re- R S A / /CountryUnited States / / /FacilityNational Institute of Standards and Technology / /IndustryTermsecurity applications / secure tamperproof hardware / unknown encryption algorithm / software engineers / certain cryptographic algorithms / cryptographic processing / security systems / secure hardware / divisor algorithm / secure processing / good algorithms / cryptographic protocols / software simulation / cryptographic hardware / tamper-resistant hardware / tamper-resistant processing / electronic devices / cryptographic devices / cryptographic device / encryption algorithm / brute-force key search attack / /OrganizationU.S. government / National Institute of Standards and Technology / /PersonRichard Lipton / Rabin / Dan Boneh / Paul Kocher / Adi Shamir / Richard DeMillo / Eli Biham / Matthew Robshaw / Mihir Bellare / Jean-Jacques Quisquater / David Naccache / Burt Kaliski / Phil Rogaway / / /Positionchief scientist / principal research scientist / /ProgrammingLanguageL / J / /ProvinceOrStateCalifornia / /PublishedMediumJournal of Cryptology / Lecture Notes in Computer Science / /Technologyencryption algorithm / block cipher / unknown encryption algorithm / smart card / certain cryptographic algorithms / private key / secret key / operating system / encryption / cryptography / just good algorithms / Instead successive encryptions / divisor algorithm / simulation / /URLhttp /SocialTag |