AU2002341079A1 - Method of reducing the size of an rsa or rabin signature - Google Patents

Method of reducing the size of an rsa or rabin signature

Info

Publication number
AU2002341079A1
AU2002341079A1 AU2002341079A AU2002341079A AU2002341079A1 AU 2002341079 A1 AU2002341079 A1 AU 2002341079A1 AU 2002341079 A AU2002341079 A AU 2002341079A AU 2002341079 A AU2002341079 A AU 2002341079A AU 2002341079 A1 AU2002341079 A1 AU 2002341079A1
Authority
AU
Australia
Prior art keywords
rsa
reducing
size
rabin signature
rabin
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002341079A
Inventor
Jean-Sebastien Coron
David Naccache
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gemplus SA
Original Assignee
Gemplus Card International SA
Gemplus SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus Card International SA, Gemplus SA filed Critical Gemplus Card International SA
Publication of AU2002341079A1 publication Critical patent/AU2002341079A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
AU2002341079A 2001-09-05 2002-09-05 Method of reducing the size of an rsa or rabin signature Abandoned AU2002341079A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0111502A FR2829333B1 (en) 2001-09-05 2001-09-05 METHOD FOR REDUCING THE SIZE OF AN RSA OR RABIN SIGNATURE
FR01/11502 2001-09-05
PCT/FR2002/003022 WO2003021864A2 (en) 2001-09-05 2002-09-05 Method of reducing the size of an rsa or rabin signature

Publications (1)

Publication Number Publication Date
AU2002341079A1 true AU2002341079A1 (en) 2003-03-18

Family

ID=8867004

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002341079A Abandoned AU2002341079A1 (en) 2001-09-05 2002-09-05 Method of reducing the size of an rsa or rabin signature

Country Status (3)

Country Link
AU (1) AU2002341079A1 (en)
FR (1) FR2829333B1 (en)
WO (1) WO2003021864A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7081839B2 (en) 2003-09-11 2006-07-25 Lucent Technologies Inc. Method and apparatus for compressing an input string to provide an equivalent decompressed output string
US7593526B2 (en) 2004-01-23 2009-09-22 Alcatel-Lucent Usa Inc. Method and apparatus for compressing rabin signatures

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2797127B1 (en) * 1999-07-30 2001-10-12 Gemplus Card Int SIGNATURE DIAGRAMS BASED ON DISCRETE LOGARITHM WITH PARTIAL OR TOTAL MESSAGE RECONSTITUTION

Also Published As

Publication number Publication date
FR2829333B1 (en) 2004-12-10
FR2829333A1 (en) 2003-03-07
WO2003021864A3 (en) 2004-02-26
WO2003021864A2 (en) 2003-03-13

Similar Documents

Publication Publication Date Title
AUPR392301A0 (en) Protein phosphatase inhibitors
EP1241577A3 (en) Methods and arrangements for improved parity-stripe processing
AUPR969501A0 (en) Forfaiting transactions
AU2002340556A1 (en) Method and device for calculating the result of an exponentiation
AU2002306929A1 (en) Part mapping system and method
AU2002305903A1 (en) Carbohydrate-associated proteins
AU2002247031A1 (en) Methods and systems for financing
AUPR963401A0 (en) Methods for the enhancement of complex peaks
AU2002341079A1 (en) Method of reducing the size of an rsa or rabin signature
AU2002352153A1 (en) Instant emulsion
AUPR772601A0 (en) Transaction method
AUPR891701A0 (en) Method for locating the edge of an object
AU2002366255A1 (en) An aid for dressing
AU2002329406A1 (en) An osteoprosthesis component
AU2002236095A1 (en) Computer system manager
AU2002339298A1 (en) Plectrum
AU2002357850A1 (en) Neurotransmission-associated proteins
AU2000252248A1 (en) Interpretation of the identity of an entity
AU2002326909A1 (en) Neurotransmission-associated proteins
AU2002357873A1 (en) Carbohydrate-associated proteins
AU2002353208A1 (en) Metalloprotease proteins
AU2002247064A1 (en) Navigation aid
AU2002303753A1 (en) Method for determining the presence of infection in an individual
AU2002234625A1 (en) Method and arrangement for the provision of data
AU2002319077A1 (en) Computer

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase