Abstract
A factorisation attack on a server-aided secret computation protocol for the RSA secret transformation named RSA-S2 is presented. Countermeasures are also proposed. As a result, it is shown that checking the computational result is essential to counteract such active attacks.

This publication has 0 references indexed in Scilit: