Skip to main content

Showing 1–3 of 3 results for author: Attias, V

Searching in archive cs. Search in all archives.
.
  1. Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions

    Authors: Vidal Attias, Luigi Vigneri, Vassil Dimitrov

    Abstract: Permissionless distributed ledgers provide a promising approach to deal with the Internet of Things (IoT) paradigm. Since IoT devices mostly generate data transactions and micropayments, distributed ledgers that use fees to regulate the network access are not an optimal choice. In this paper, we study a feeless architecture developed by IOTA and designed specifically for the IoT. Due to the lack o… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Journal ref: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 1-6

  2. Fast Generation of RSA Keys using Smooth Integers

    Authors: Vassil Dimitrov, Luigi Vigneri, Vidal Attias

    Abstract: Primality generation is the cornerstone of several essential cryptographic systems. The problem has been a subject of deep investigations, but there is still a substantial room for improvements. Typically, the algorithms used have two parts trial divisions aimed at eliminating numbers with small prime factors and primality tests based on an easy-to-compute statement that is valid for primes and in… ▽ More

    Submitted 13 July, 2021; v1 submitted 24 December, 2019; originally announced December 2019.

    Comments: This paper contains 11 pages and 8 tables, in IEEE Transactions on Computers

  3. arXiv:1912.11401  [pdf, ps, other

    cs.CR cs.DC

    On the Decentralized Generation of theRSA Moduli in Multi-Party Settings

    Authors: Vidal Attias, Luigi Vigneri, Vassil Dimitrov

    Abstract: RSA cryptography is still widely used. Some of its applications (e.g., distributed signature schemes, cryptosystems) do not allow the RSA modulus to be generated by a centralized trusted entity. Instead, the factorization must remain unknown to all the network participants. To this date, the existing algorithms are either computationally expensive, or limited to two-party settings. In this work, w… ▽ More

    Submitted 24 December, 2019; originally announced December 2019.

    Comments: The submission contains 14 pages and 12 figures. The conference to submit is not determined yet