2013
DOI: 10.1007/978-3-642-37300-8_11
|View full text |Cite
|
Sign up to set email alerts
|

SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Also, we note that when a message is encrypted by a source or an intermediate node and when the message is decrypted at the destination node, two main factors will affect the time needed for encryption/decryption: 1) the size of the RSA key, and 2) the size of the message. Several studies, such as [31] and [32] proved that the RSA encryption/decryption delay will increase as the key size increases. Also, it is well known that when we want to encrypt a large message using RSA, we first generate a symmetric key using a symmetric key cryptography algorithm (such as AES, 3DES, PRESENT, ...) and use it to encrypt the message, then we encrypt the symmetric key with the RSA public key.…”
Section: System Analysismentioning
confidence: 99%
“…Also, we note that when a message is encrypted by a source or an intermediate node and when the message is decrypted at the destination node, two main factors will affect the time needed for encryption/decryption: 1) the size of the RSA key, and 2) the size of the message. Several studies, such as [31] and [32] proved that the RSA encryption/decryption delay will increase as the key size increases. Also, it is well known that when we want to encrypt a large message using RSA, we first generate a symmetric key using a symmetric key cryptography algorithm (such as AES, 3DES, PRESENT, ...) and use it to encrypt the message, then we encrypt the symmetric key with the RSA public key.…”
Section: System Analysismentioning
confidence: 99%