메뉴 건너뛰기




Volumn E87-A, Issue 1, 2004, Pages 94-101

A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting

Author keywords

Factoring; Fast decryption; Modular inverse; PKCS 1 version 2.1; RSA cryptosystem; Smart cards

Indexed keywords

ALGORITHMS; COMPUTER ARCHITECTURE; INVERSE PROBLEMS; SMART CARDS; THEOREM PROVING;

EID: 0842267122     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (39)
  • 1
    • 84874976434 scopus 로고
    • Open problems in number theoretic complexity, II
    • Proc. ANTS-I
    • L. Adleman and K. McCurley, "Open problems in number theoretic complexity, II," Proc. ANTS-I, LNCS 877, pp.291-322, 1994.
    • (1994) LNCS , vol.877 , pp. 291-322
    • Adleman, L.1    McCurley, K.2
  • 3
    • 0018711581 scopus 로고
    • Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages
    • G. Blakley and I. Borosh, "Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages," Comput. & Maths. with Appls., vol.5, pp.169-178, 1979.
    • (1979) Comput. & Maths. with Appls. , vol.5 , pp. 169-178
    • Blakley, G.1    Borosh, I.2
  • 4
    • 84957045680 scopus 로고    scopus 로고
    • rq for large r
    • Advances in Cryptology-CRYPTO'99
    • rq for large r," Advances in Cryptology -CRYPTO'99, LNCS 1666, pp.326-337, 1999.
    • (1999) LNCS , vol.1666 , pp. 326-337
    • Boneh, D.1    Durfee, G.2    Howgrave-Graham, N.3
  • 6
    • 0141473270 scopus 로고    scopus 로고
    • Fast variants of RSA
    • D. Boneh and H. Shacham, "Fast variants of RSA," CryptoBytes, vol.5, no.1, pp.1-9, 2002.
    • (2002) CryptoBytes , vol.5 , Issue.1 , pp. 1-9
    • Boneh, D.1    Shacham, H.2
  • 7
    • 84956985315 scopus 로고    scopus 로고
    • Recent progress and prospects for integer factorisation algorithms
    • COCOON 2000
    • R. Brent, "Recent progress and prospects for integer factorisation algorithms," COCOON 2000, LNCS 1858, pp.3-22, 2000.
    • (2000) LNCS , vol.1858 , pp. 3-22
    • Brent, R.1
  • 9
    • 84947902524 scopus 로고    scopus 로고
    • Low-exponent RSA with related messages
    • Advances in Cryptology - EUROCRYPT'96
    • D. Coppersmith, M. Franklin, J. Patarin, and M. Reiter, "Low-exponent RSA with related messages," Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pp.1-9, 1996.
    • (1996) LNCS , vol.1070 , pp. 1-9
    • Coppersmith, D.1    Franklin, M.2    Patarin, J.3    Reiter, M.4
  • 10
    • 84947924912 scopus 로고    scopus 로고
    • Finding a small root of a univariate modular equation
    • Advances in Cryptology EUROCRYPT'96
    • D. Coppersmith, "Finding a small root of a univariate modular equation," Advances in Cryptology EUROCRYPT'96, LNCS 1070, pp.155-165, 1996.
    • (1996) LNCS , vol.1070 , pp. 155-165
    • Coppersmith, D.1
  • 11
    • 85027177962 scopus 로고    scopus 로고
    • 2 with the elliptic curve method
    • CORR 2002-02, CACR, the University of Waterloo
    • 2 with the elliptic curve method," Technical Report, CORR 2002-02, CACR, the University of Waterloo, 2002.
    • (2002) Technical Report
    • Ebinger, P.1    Teske, E.2
  • 12
    • 0023985175 scopus 로고
    • Solving simultaneous modular equations of low degree
    • J. Håstad, "Solving simultaneous modular equations of low degree," SIAM J. Comput., vol.17, pp.336-341, 1988.
    • (1988) SIAM J. Comput. , vol.17 , pp. 336-341
    • Håstad, J.1
  • 14
    • 0242445290 scopus 로고
    • Secure use of RSA
    • B. Kaliski and M. Robshaw, "Secure use of RSA," CryptoBytes, vol.1, no.3, pp.7-13, 1995.
    • (1995) CryptoBytes , vol.1 , Issue.3 , pp. 7-13
    • Kaliski, B.1    Robshaw, M.2
  • 15
    • 14944351892 scopus 로고    scopus 로고
    • ECMNET Project, http://www.loria.fr/̃zimmerma/records/ecmnet.html
    • ECMNET Project
  • 16
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H.W. Lenstra, Jr., "Factoring integers with elliptic curves," Annals of Mathematics, vol.126, pp.649-673, 1987.
    • (1987) Annals of Mathematics , vol.126 , pp. 649-673
    • Lenstra H.W., Jr.1
  • 17
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. Lenstra and E. Verheul, "Selecting cryptographic key sizes, " J. Cryptology, vol.14, no.4, pp.255-293, 2001.
    • (2001) J. Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.2
  • 19
    • 84862483707 scopus 로고    scopus 로고
    • LiDIA, Technische Universtät Darmstadt
    • LiDIA, A C++ Library for Computational Number Theory, Technische Universtät Darmstadt, http://www.informatik.tu-darmstadt.de/TI/LiDIA/
    • A C++ Library for Computational Number Theory
  • 20
    • 84947747277 scopus 로고    scopus 로고
    • s
    • Progress in Cryptology-INDOCRYPT 2000
    • s," Progress in Cryptology-INDOCRYPT 2000, LNCS 1977, pp.283-294, 2002.
    • (2002) LNCS , vol.1977 , pp. 283-294
    • Lim, S.1    Kim, S.2    Yie, I.3    Lee, H.4
  • 21
    • 0029325653 scopus 로고
    • Fast generation of prime numbers and secure public-key cryptographic parameters
    • U.M. Maurer, "Fast generation of prime numbers and secure public-key cryptographic parameters," J. Cryptology, vol.8, pp.123-155, 1995.
    • (1995) J. Cryptology , vol.8 , pp. 123-155
    • Maurer, U.M.1
  • 23
    • 0025207738 scopus 로고
    • A fast signature scheme based on congruential polynomial operations
    • T. Okamoto, "A fast signature scheme based on congruential polynomial operations," IEEE Trans. Inf. Theory, vol.36, no.1, pp.47-53, 1990.
    • (1990) IEEE Trans. Inf. Theory , vol.36 , Issue.1 , pp. 47-53
    • Okamoto, T.1
  • 24
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • Advances in Cryptology EUROCRYPT'98
    • T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring," Advances in Cryptology EUROCRYPT'98, LNCS 1403, pp.308-318, 1998.
    • (1998) LNCS , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 26
    • 0842327115 scopus 로고    scopus 로고
    • A new public-key cryptosystem over the quadratic order with quadratic decryption time
    • S. Paulus and T. Takagi, "A new public-key cryptosystem over the quadratic order with quadratic decryption time," J. Cryptology, vol.13, pp.263-272, 2000.
    • (2000) J. Cryptology , vol.13 , pp. 263-272
    • Paulus, S.1    Takagi, T.2
  • 27
    • 0030123384 scopus 로고    scopus 로고
    • Faster factoring of integers of a special form
    • April
    • R. Peralta and E. Okamoto, "Faster factoring of integers of a special form," IEICE Trans. Fundamentals, vol.E79-A, no.4, pp.489-493, April 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.4 , pp. 489-493
    • Peralta, R.1    Okamoto, E.2
  • 28
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • J.-J. Quisquater and C. Couvreur, "Fast decipherment algorithm for RSA public-key cryptosystem," Electron. Lett., vol.18, pp.905-907, 1982.
    • (1982) Electron. Lett. , vol.18 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 29
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization
    • Laboratory of Computer Science, MIT, Cambridge
    • M. Rabin, "Digitalized signatures and public-key functions as intractable as factorization," Technical Report, no.212, pp.1-16, Laboratory of Computer Science, MIT, Cambridge, 1979.
    • (1979) Technical Report, No. 212 , vol.212 , pp. 1-16
    • Rabin, M.1
  • 30
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 33
    • 0008631959 scopus 로고
    • RSA for paranoids
    • Autumn
    • A. Shamir, "RSA for paranoids," CryptoBytes, vol.1, pp.1-4, Autumn, 1995.
    • (1995) CryptoBytes , vol.1 , pp. 1-4
    • Shamir, A.1
  • 34
    • 0003320305 scopus 로고    scopus 로고
    • A cost-based security analysis of symmetric and asymmetric key lengths
    • R. Silverman, "A cost-based security analysis of symmetric and asymmetric key lengths," RSA Laboratories Bulletin, no.13, 2000. http://www.rsasecurity.com/rsalabs/bulletins/bulletin13.html
    • (2000) RSA Laboratories Bulletin , Issue.13
    • Silverman, R.1
  • 35
    • 84958680532 scopus 로고    scopus 로고
    • Fast RSA-type cryptosystems using n-adic expansion
    • Advances in Cryptology - CRYPTO'97
    • T. Takagi, "Fast RSA-type cryptosystems using n-adic expansion," Advances in Cryptology - CRYPTO'97, LNCS 1294, pp.372-384, 1997.
    • (1997) LNCS , vol.1294 , pp. 372-384
    • Takagi, T.1
  • 36
    • 84957625495 scopus 로고    scopus 로고
    • kq
    • CRYPTO'98
    • kq," CRYPTO'98, LNCS 1462, pp.318-326, 1998.
    • (1998) LNCS , vol.1462 , pp. 318-326
    • Takagi, T.1
  • 38
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M.J. Wiener, "Cryptanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, vol.36, no.3, pp.553-558, 1990.
    • (1990) IEEE Trans. Inf. Theory , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.J.1
  • 39
    • 0347818260 scopus 로고
    • Some remarks concerning the M.I.T. public-key cryptosystem
    • H.C. Williams and B. Schmid, "Some remarks concerning the M.I.T. public-key cryptosystem," BIT 19, pp.525-538, 1979.
    • (1979) BIT , vol.19 , pp. 525-538
    • Williams, H.C.1    Schmid, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.