{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:51Z","timestamp":1750307991665,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128826","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"26-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Improving secure server performance by re-balancing SSL\/TLS handshakes"],"prefix":"10.1145","author":[{"given":"Claude","family":"Castelluccia","sequence":"first","affiliation":[{"name":"INRIA Zirst, Saint Ismier, Cedex, France"}]},{"given":"Einar","family":"Mykletun","sequence":"additional","affiliation":[{"name":"University of California, Irvine Irvine, CA"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine Irvine, CA"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"497","volume-title":"Speeding up Secret Computations with Insecure Auxiliary Devices,\" Proceedings of Crypto '88","author":"Matsumoto T.","year":"1988","unstructured":"T. Matsumoto , K. Kato , and H. Imai , \" Speeding up Secret Computations with Insecure Auxiliary Devices,\" Proceedings of Crypto '88 , pp. 497 -- 506 , 1988 .]] T. Matsumoto, K. Kato, and H. Imai, \"Speeding up Secret Computations with Insecure Auxiliary Devices,\" Proceedings of Crypto '88, pp. 497--506, 1988.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"Private communication \"Private communication with D. Wagner \" 2005.]]  Private communication \"Private communication with D. Wagner \" 2005.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"Network Working Group \"RFC 2246 - The TLS Protocol Version 1.0 \" Internet RFC\/STD\/FYI\/BCP Archives 1999 http:\/\/www.faqs.org\/rfcs\/rfc2246.html.]]  Network Working Group \"RFC 2246 - The TLS Protocol Version 1.0 \" Internet RFC\/STD\/FYI\/BCP Archives 1999 http:\/\/www.faqs.org\/rfcs\/rfc2246.html.]]"},{"key":"e_1_3_2_1_4_1","unstructured":"BEA WebLogic \"BEA WebLogic Server Frequently Asked Questions \" http:\/\/e-docs.bea.com\/wls\/docs60\/faq\/security.html.]]  BEA WebLogic \"BEA WebLogic Server Frequently Asked Questions \" http:\/\/e-docs.bea.com\/wls\/docs60\/faq\/security.html.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850673"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19820617"},{"key":"e_1_3_2_1_8_1","volume-title":"Handbook of Applied Cryptography,\" The CRC Press series on discrete mathematics and its applications","author":"Menezes A. J.","year":"1997","unstructured":"A. J. Menezes , P. C. V. Oorschot , and S. A. Vanstone , \" Handbook of Applied Cryptography,\" The CRC Press series on discrete mathematics and its applications , 1997 .]] A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, \"Handbook of Applied Cryptography,\" The CRC Press series on discrete mathematics and its applications, 1997.]]"},{"key":"e_1_3_2_1_9_1","first-page":"153","volume-title":"Attacks on Protocols for Server-Aided RSA Computations,\" Proceedings of Eurocrypt '92","author":"Pfitzmann B.","year":"1992","unstructured":"B. Pfitzmann and M. Waidner , \" Attacks on Protocols for Server-Aided RSA Computations,\" Proceedings of Eurocrypt '92 , pp. 153 -- 162 , 1992 .]] B. Pfitzmann and M. Waidner, \"Attacks on Protocols for Server-Aided RSA Computations,\" Proceedings of Eurocrypt '92, pp. 153--162, 1992.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19920937"},{"key":"e_1_3_2_1_11_1","first-page":"296","volume-title":"On verifiable implicit asking protocols for RSA computation,\" Advances in Cryptology - Proceedings of Auscrypt '92","author":"Matsumoto T.","year":"1992","unstructured":"T. Matsumoto , H. Imai , C. S. Laih , and S. M. Yen , \" On verifiable implicit asking protocols for RSA computation,\" Advances in Cryptology - Proceedings of Auscrypt '92 , vol. 718 , pp. 296 -- 307 , 1992 .]] T. Matsumoto, H. Imai, C. S. Laih, and S. M. Yen, \"On verifiable implicit asking protocols for RSA computation,\" Advances in Cryptology - Proceedings of Auscrypt '92, vol. 718, pp. 296--307, 1992.]]"},{"key":"e_1_3_2_1_12_1","first-page":"70","volume-title":"Security and performance of server-aided RSA computation protocols,\" Advances in Cryptology - CRYPTO '95","author":"Lim C. H.","year":"1995","unstructured":"C. H. Lim and P. J. Lee , \" Security and performance of server-aided RSA computation protocols,\" Advances in Cryptology - CRYPTO '95 , pp. 70 -- 83 , 1995 .]] C. H. Lim and P. J. Lee, \"Security and performance of server-aided RSA computation protocols,\" Advances in Cryptology - CRYPTO '95, pp. 70--83, 1995.]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.262121"},{"key":"e_1_3_2_1_14_1","first-page":"167","article-title":"Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes","author":"Laih C.","year":"1999","unstructured":"C. Laih and F. Tu , \" Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes ,\" International Workshops on Parallel Processing , pp. 167 -- 173 , 1999 .]] C. Laih and F. Tu, \"Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes,\" International Workshops on Parallel Processing, pp. 167--173, 1999.]]","journal-title":"International Workshops on Parallel Processing"},{"key":"e_1_3_2_1_15_1","first-page":"57","volume-title":"Fast Server-Aided RSA Signatures Secure Against Active Attacks,\" Advances in Cryptology - CRYPTO '95","author":"B\u00e9guin P.","year":"1995","unstructured":"P. B\u00e9guin and J.J. Quisquater , \" Fast Server-Aided RSA Signatures Secure Against Active Attacks,\" Advances in Cryptology - CRYPTO '95 , pp. 57 -- 69 , 1995 .]] P. B\u00e9guin and J.J. Quisquater, \"Fast Server-Aided RSA Signatures Secure Against Active Attacks,\" Advances in Cryptology - CRYPTO '95, pp. 57--69, 1995.]]"},{"key":"e_1_3_2_1_16_1","first-page":"33","article-title":"A new approach to server-aided secret computation","author":"Hong S.","year":"1998","unstructured":"S. Hong , J. Shin , and H. Lee-Kwang , \" A new approach to server-aided secret computation ,\" International Conference on Information Security and Cryptology , pp. 33 -- 45 , 1998 .]] S. Hong, J. Shin, and H. Lee-Kwang, \"A new approach to server-aided secret computation,\" International Conference on Information Security and Cryptology, pp. 33--45, 1998.]]","journal-title":"International Conference on Information Security and Cryptology"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352616"},{"key":"e_1_3_2_1_18_1","first-page":"21","volume-title":"On the insecurity of a server-aided RSA protocol,\" Proceedings of Asiacrypt '01","author":"Nguyen P.","year":"2001","unstructured":"P. Nguyen and I. Shparlinski , \" On the insecurity of a server-aided RSA protocol,\" Proceedings of Asiacrypt '01 , vol. 2248 , pp. 21 -- 35 , 2001 .]] P. Nguyen and I. Shparlinski, \"On the insecurity of a server-aided RSA protocol,\" Proceedings of Asiacrypt '01, vol. 2248, pp. 21--35, 2001.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"key":"e_1_3_2_1_20_1","first-page":"28","article-title":"Improving SSL Handshake Performance via Batching","volume":"2001","author":"Shacham H.","year":"2020","unstructured":"H. Shacham and D. Boneh , \" Improving SSL Handshake Performance via Batching ,\" Proceedings of RSA 2001 , vol. 2020 , pp. 28 -- 43 , 2001.]] H. Shacham and D. Boneh, \"Improving SSL Handshake Performance via Batching,\" Proceedings of RSA 2001, vol. 2020, pp. 28--43, 2001.]]","journal-title":"Proceedings of RSA"},{"key":"e_1_3_2_1_21_1","first-page":"553","article-title":"Performance Analysis of TLS Web Servers","author":"Coarfa C.","year":"2002","unstructured":"C. Coarfa , P. Druschel and D. S. Wallach , \" Performance Analysis of TLS Web Servers ,\" 9th Network and Systems Security Symposium , pp. 553 -- 558 , 2002 .]] C. Coarfa, P. Druschel and D. S. Wallach, \"Performance Analysis of TLS Web Servers,\" 9th Network and Systems Security Symposium, pp. 553--558, 2002.]]","journal-title":"9th Network and Systems Security Symposium"},{"volume-title":"An Architecture for a High","author":"Mraz R.","key":"e_1_3_2_1_22_1","unstructured":"R. Mraz , \"Secure Blue : An Architecture for a High Volume SSL Internet Server,\" 17th Annual Computer Security Applications Conference, 2001 .]] R. Mraz, \"Secure Blue: An Architecture for a High Volume SSL Internet Server,\" 17th Annual Computer Security Applications Conference, 2001.]]"},{"key":"e_1_3_2_1_23_1","unstructured":"Sonic WALL \"Sonic WALLE SSL-RX \" http:\/\/www.sonicwall.com\/products\/sslrx.html.]]  Sonic WALL \"Sonic WALLE SSL-RX \" http:\/\/www.sonicwall.com\/products\/sslrx.html.]]"},{"key":"e_1_3_2_1_24_1","first-page":"151","article-title":"Client Puzzles: A Cryptographic Defense Against Connection Depletion","author":"Juels A.","year":"1999","unstructured":"A. Juels and J. Brainard , \" Client Puzzles: A Cryptographic Defense Against Connection Depletion ,\" 5th Network and Systems Security Symposium , pp. 151 -- 165 , 1999 .]] A. Juels and J. Brainard, \"Client Puzzles: A Cryptographic Defense Against Connection Depletion,\" 5th Network and Systems Security Symposium, pp. 151--165, 1999.]]","journal-title":"5th Network and Systems Security Symposium"},{"key":"e_1_3_2_1_25_1","volume-title":"Using Client Puzzles to Protect TLS,\" Proceedings of the USENIX Security Symposium","author":"Dean D.","year":"2001","unstructured":"D. Dean and A. Stubblefield , \" Using Client Puzzles to Protect TLS,\" Proceedings of the USENIX Security Symposium , 2001 .]] D. Dean and A. Stubblefield, \"Using Client Puzzles to Protect TLS,\" Proceedings of the USENIX Security Symposium, 2001.]]"},{"key":"e_1_3_2_1_26_1","volume-title":"Cryptography as a Network Service,\" 7th Network and Systems Security Symposium","author":"Berson T.","year":"2001","unstructured":"T. Berson , D. Dean , M. Franklin , D. Smetters , and M. Spreitzer , \" Cryptography as a Network Service,\" 7th Network and Systems Security Symposium , 2001 .]] T. Berson, D. Dean, M. Franklin, D. Smetters, and M. Spreitzer, \"Cryptography as a Network Service,\" 7th Network and Systems Security Symposium, 2001.]]"},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Fast Variants of RSA","volume":"5","author":"Boneh D.","year":"2002","unstructured":"D. Boneh and H. Shacham , \" Fast Variants of RSA ,\" CryptoBytes (RSA Laboratories) , vol. 5 , pp. 1 -- 9 , 2002 .]] D. Boneh and H. Shacham, \"Fast Variants of RSA,\" CryptoBytes (RSA Laboratories), vol. 5, pp. 1--9, 2002.]]","journal-title":"CryptoBytes (RSA Laboratories)"},{"key":"e_1_3_2_1_28_1","first-page":"6","article-title":"A Course in Computational Algebraic Number Theory","volume":"138","author":"Cohen H.","year":"1996","unstructured":"H. Cohen , \" A Course in Computational Algebraic Number Theory ,\" Graduate Texts in Mathematics , vol. 138 , pp. 6 , 1996 .]] H. Cohen, \"A Course in Computational Algebraic Number Theory,\" Graduate Texts in Mathematics, vol. 138, pp. 6, 1996.]]","journal-title":"Graduate Texts in Mathematics"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.54902"},{"key":"e_1_3_2_1_30_1","first-page":"175","volume-title":"Proceedings of Crypto '89","author":"Fiat A.","year":"1989","unstructured":"A. Fiat , \"Batch RSA,\" Proceedings of Crypto '89 , pp. 175 -- 185 , 1989 .]] A. Fiat, \"Batch RSA,\" Proceedings of Crypto '89, pp. 175--185, 1989.]]"},{"key":"e_1_3_2_1_31_1","first-page":"95","volume-title":"More Flexible Exponentiation with Precomputation,\" Advances in Cryptology - CRYPTO '94","author":"Lim C. H.","year":"1994","unstructured":"C. H. Lim and P. J. Lee , \" More Flexible Exponentiation with Precomputation,\" Advances in Cryptology - CRYPTO '94 , pp. 95 -- 107 , 1994 .]] C. H. Lim and P. J. Lee, \"More Flexible Exponentiation with Precomputation,\" Advances in Cryptology - CRYPTO '94, pp. 95--107, 1994.]]"},{"key":"e_1_3_2_1_32_1","first-page":"231","article-title":"Speeding Up Secure Web Transactions Using Elliptic Curve Cryptgraphy","author":"Gupta V.","year":"2004","unstructured":"V. Gupta and D. Stebila and S. Fung , \" Speeding Up Secure Web Transactions Using Elliptic Curve Cryptgraphy ,\" 11th Network and Systems Security Symposium , pp. 231 -- 239 , 2004 .]] V. Gupta and D. Stebila and S. Fung, \"Speeding Up Secure Web Transactions Using Elliptic Curve Cryptgraphy,\" 11th Network and Systems Security Symposium, pp. 231--239, 2004.]]","journal-title":"11th Network and Systems Security Symposium"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":32,"alternative-id":["10.1145\/1128817.1128826","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128826","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}