메뉴 건너뛰기




Volumn 43, Issue 4, 2000, Pages 349-354

The multi-dimension RSA and its low exponent security

Author keywords

Euler Ferma theorem in N x ; Factorization; Low exponent security; Multi dimension RSA; Polynomial over finite field

Indexed keywords


EID: 0042689537     PISSN: 10069321     EISSN: None     Source Type: Journal    
DOI: 10.1007/BF02916982     Document Type: Article
Times cited : (11)

References (14)
  • 1
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public key cryptosystems, Comm. ACM, 1978, 21: 120.
    • (1978) Comm. ACM , vol.21 , pp. 120
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 4
    • 0042240561 scopus 로고
    • A kind of trap-door one-way functions over algebraic integer ring
    • Sun, Qi, A kind of trap-door one-way functions over algebraic integer ring, Journal of Sichuan University (in Chinese), 1986, (2): 22.
    • (1986) Journal of Sichuan University (In Chinese) , Issue.2 , pp. 22
    • Sun, Q.1
  • 5
    • 0041740180 scopus 로고
    • Two new types of cryptosystems over Eisenstein's ring ℤ[ω]
    • Cao Zhenfu, Two new types of cryptosystems over Eisenstein's ring ℤ[ω], J. Electronics, 1992, 14(3): 286.
    • (1992) J. Electronics , vol.14 , Issue.3 , pp. 286
    • Zhenfu, C.1
  • 6
    • 0007345301 scopus 로고
    • Quadratic fields and cryptography
    • ed. Loxton, J. H., Cambridge: Cambridge University Press
    • Buchmann, J., Williams, H. C., Quadratic fields and cryptography, Number Theory and Cryptography (ed. Loxton, J. H.), Cambridge: Cambridge University Press, 1990, 9-25 .
    • (1990) Number Theory and Cryptography , pp. 9-25
    • Buchmann, J.1    Williams, H.C.2
  • 8
    • 0042741674 scopus 로고
    • Some public-key crypto-functions as intractable as factorization
    • Williams, H. C., Some public-key crypto-functions as intractable as factorization, Cryptologia, 1985, 9: 223.
    • (1985) Cryptologia , vol.9 , pp. 223
    • Williams, H.C.1
  • 10
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • Boneh, D., Twenty years of attacks on the RSA cryptosystem, Notices of the AMS, 1999, 46(2): 203.
    • (1999) Notices of the AMS , vol.46 , Issue.2 , pp. 203
    • Boneh, D.1
  • 11
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • Wiener, M., Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory, 1990, 36: 553.
    • (1990) IEEE Trans. Inform. Theory , vol.36 , pp. 553
    • Wiener, M.1
  • 13
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • Coppersmith, D., Small solutions to polynomial equations, and low exponent RSA vulnerabilities, J. Cryptology, 1997, 10: 233.
    • (1997) J. Cryptology , vol.10 , pp. 233
    • Coppersmith, D.1
  • 14
    • 0023985175 scopus 로고
    • Solving simultaneous modular equations of low degree
    • Hastad, J., Solving simultaneous modular equations of low degree, SIAM J. Comput., 1988, 17: 336.
    • (1988) SIAM J. Comput. , vol.17 , pp. 336
    • Hastad, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.