-
1
-
-
84874976434
-
Open problems in number theoretic complexity, II
-
Proc. ANTS-I
-
L. Adleman and K. McCurley, "Open problems in number theoretic complexity, II," Proc. ANTS-I, LNCS 877, pp.291-322, 1994.
-
(1994)
LNCS
, vol.877
, pp. 291-322
-
-
Adleman, L.1
McCurley, K.2
-
2
-
-
85027145276
-
-
RSA-160
-
F. Bahr, J. Franke, T. Kleinjung, M. Lochter, and M. Böhm, RSA-160, http://www.loria.fr/̃zimmerma/records/rsa160.
-
-
-
Bahr, F.1
Franke, J.2
Kleinjung, T.3
Lochter, M.4
Böhm, M.5
-
3
-
-
0018711581
-
Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages
-
G. Blakley and I. Borosh, "Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages," Comput. & Maths. with Appls., vol.5, pp.169-178, 1979.
-
(1979)
Comput. & Maths. with Appls.
, vol.5
, pp. 169-178
-
-
Blakley, G.1
Borosh, I.2
-
5
-
-
0034226114
-
0.292
-
0.292," IEEE Trans. Inf. Theory, vol.46, no.4, pp.1339-1349, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1339-1349
-
-
Boneh, D.1
Durfee, G.2
-
6
-
-
0141473270
-
Fast variants of RSA
-
D. Boneh and H. Shacham, "Fast variants of RSA," CryptoBytes, vol.5, no.1, pp.1-9, 2002.
-
(2002)
CryptoBytes
, vol.5
, Issue.1
, pp. 1-9
-
-
Boneh, D.1
Shacham, H.2
-
7
-
-
84956985315
-
Recent progress and prospects for integer factorisation algorithms
-
COCOON 2000
-
R. Brent, "Recent progress and prospects for integer factorisation algorithms," COCOON 2000, LNCS 1858, pp.3-22, 2000.
-
(2000)
LNCS
, vol.1858
, pp. 3-22
-
-
Brent, R.1
-
8
-
-
0036579340
-
r × q for large r
-
May
-
r × q for large r," IEICE Trans. Fundamentals, vol.E85-A, no.5, pp.1050-1053, May 2002.
-
(2002)
IEICE Trans. Fundamentals
, vol.E85-A
, Issue.5
, pp. 1050-1053
-
-
Chida, K.1
Uchiyama, S.2
Saito, T.3
-
9
-
-
84947902524
-
Low-exponent RSA with related messages
-
Advances in Cryptology - EUROCRYPT'96
-
D. Coppersmith, M. Franklin, J. Patarin, and M. Reiter, "Low-exponent RSA with related messages," Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pp.1-9, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 1-9
-
-
Coppersmith, D.1
Franklin, M.2
Patarin, J.3
Reiter, M.4
-
10
-
-
84947924912
-
Finding a small root of a univariate modular equation
-
Advances in Cryptology EUROCRYPT'96
-
D. Coppersmith, "Finding a small root of a univariate modular equation," Advances in Cryptology EUROCRYPT'96, LNCS 1070, pp.155-165, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 155-165
-
-
Coppersmith, D.1
-
11
-
-
85027177962
-
2 with the elliptic curve method
-
CORR 2002-02, CACR, the University of Waterloo
-
2 with the elliptic curve method," Technical Report, CORR 2002-02, CACR, the University of Waterloo, 2002.
-
(2002)
Technical Report
-
-
Ebinger, P.1
Teske, E.2
-
12
-
-
0023985175
-
Solving simultaneous modular equations of low degree
-
J. Håstad, "Solving simultaneous modular equations of low degree," SIAM J. Comput., vol.17, pp.336-341, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 336-341
-
-
Håstad, J.1
-
13
-
-
26444461681
-
On some attacks on multi-prime RSA
-
LNCS2595
-
J. Hinek, M. Low, and E. Teske, "On some attacks on multi-prime RSA," Selected Areas in Cryptography 2002, LNCS2595, pp.385-404, 2002.
-
(2002)
Selected Areas in Cryptography 2002
, pp. 385-404
-
-
Hinek, J.1
Low, M.2
Teske, E.3
-
14
-
-
0242445290
-
Secure use of RSA
-
B. Kaliski and M. Robshaw, "Secure use of RSA," CryptoBytes, vol.1, no.3, pp.7-13, 1995.
-
(1995)
CryptoBytes
, vol.1
, Issue.3
, pp. 7-13
-
-
Kaliski, B.1
Robshaw, M.2
-
15
-
-
14944351892
-
-
ECMNET Project, http://www.loria.fr/̃zimmerma/records/ecmnet.html
-
ECMNET Project
-
-
-
16
-
-
0001258323
-
Factoring integers with elliptic curves
-
H.W. Lenstra, Jr., "Factoring integers with elliptic curves," Annals of Mathematics, vol.126, pp.649-673, 1987.
-
(1987)
Annals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra H.W., Jr.1
-
17
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. Lenstra and E. Verheul, "Selecting cryptographic key sizes, " J. Cryptology, vol.14, no.4, pp.255-293, 2001.
-
(2001)
J. Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
-
18
-
-
0003638131
-
The development of the number field sieve
-
Springer
-
A.K. Lenstra and H.W. Lenstra, Jr., eds., "The development of the number field sieve," Lecture Notes in Mathematics, 1554, Springer, 1991.
-
(1991)
Lecture Notes in Mathematics
, vol.1554
-
-
Lenstra, A.K.1
Lenstra H.W., Jr.2
-
19
-
-
84862483707
-
-
LiDIA, Technische Universtät Darmstadt
-
LiDIA, A C++ Library for Computational Number Theory, Technische Universtät Darmstadt, http://www.informatik.tu-darmstadt.de/TI/LiDIA/
-
A C++ Library for Computational Number Theory
-
-
-
20
-
-
84947747277
-
s
-
Progress in Cryptology-INDOCRYPT 2000
-
s," Progress in Cryptology-INDOCRYPT 2000, LNCS 1977, pp.283-294, 2002.
-
(2002)
LNCS
, vol.1977
, pp. 283-294
-
-
Lim, S.1
Kim, S.2
Yie, I.3
Lee, H.4
-
21
-
-
0029325653
-
Fast generation of prime numbers and secure public-key cryptographic parameters
-
U.M. Maurer, "Fast generation of prime numbers and secure public-key cryptographic parameters," J. Cryptology, vol.8, pp.123-155, 1995.
-
(1995)
J. Cryptology
, vol.8
, pp. 123-155
-
-
Maurer, U.M.1
-
23
-
-
0025207738
-
A fast signature scheme based on congruential polynomial operations
-
T. Okamoto, "A fast signature scheme based on congruential polynomial operations," IEEE Trans. Inf. Theory, vol.36, no.1, pp.47-53, 1990.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, Issue.1
, pp. 47-53
-
-
Okamoto, T.1
-
24
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Advances in Cryptology EUROCRYPT'98
-
T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring," Advances in Cryptology EUROCRYPT'98, LNCS 1403, pp.308-318, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
26
-
-
0842327115
-
A new public-key cryptosystem over the quadratic order with quadratic decryption time
-
S. Paulus and T. Takagi, "A new public-key cryptosystem over the quadratic order with quadratic decryption time," J. Cryptology, vol.13, pp.263-272, 2000.
-
(2000)
J. Cryptology
, vol.13
, pp. 263-272
-
-
Paulus, S.1
Takagi, T.2
-
27
-
-
0030123384
-
Faster factoring of integers of a special form
-
April
-
R. Peralta and E. Okamoto, "Faster factoring of integers of a special form," IEICE Trans. Fundamentals, vol.E79-A, no.4, pp.489-493, April 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.4
, pp. 489-493
-
-
Peralta, R.1
Okamoto, E.2
-
28
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
J.-J. Quisquater and C. Couvreur, "Fast decipherment algorithm for RSA public-key cryptosystem," Electron. Lett., vol.18, pp.905-907, 1982.
-
(1982)
Electron. Lett.
, vol.18
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
-
29
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
Laboratory of Computer Science, MIT, Cambridge
-
M. Rabin, "Digitalized signatures and public-key functions as intractable as factorization," Technical Report, no.212, pp.1-16, Laboratory of Computer Science, MIT, Cambridge, 1979.
-
(1979)
Technical Report, No. 212
, vol.212
, pp. 1-16
-
-
Rabin, M.1
-
30
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
31
-
-
77956089601
-
Factorization of a 512-bit RSA modulus
-
LNCS1807
-
S. Cavallar, B. Dodson, A. Lenstra, W. Lioen, P. Montgomery, B. Murphy, H. te Riele, K. Aardal, J. Gilchrist, G. Guillerm, P. Leyland, J. Marchand, F. Morian, A. Muffett, C. Putnam, C. Putnam, and P. Zimmermann, "Factorization of a 512-bit RSA modulus," EUROCRYPT 2000, LNCS1807, pp.1-18, 2000.
-
(2000)
EUROCRYPT 2000
, pp. 1-18
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.3
Lioen, W.4
Montgomery, P.5
Murphy, B.6
Te Riele, H.7
Aardal, K.8
Gilchrist, J.9
Guillerm, G.10
Leyland, P.11
Marchand, J.12
Morian, F.13
Muffett, A.14
Putnam, C.15
Putnam, C.16
Zimmermann, P.17
-
33
-
-
0008631959
-
RSA for paranoids
-
Autumn
-
A. Shamir, "RSA for paranoids," CryptoBytes, vol.1, pp.1-4, Autumn, 1995.
-
(1995)
CryptoBytes
, vol.1
, pp. 1-4
-
-
Shamir, A.1
-
34
-
-
0003320305
-
A cost-based security analysis of symmetric and asymmetric key lengths
-
R. Silverman, "A cost-based security analysis of symmetric and asymmetric key lengths," RSA Laboratories Bulletin, no.13, 2000. http://www.rsasecurity.com/rsalabs/bulletins/bulletin13.html
-
(2000)
RSA Laboratories Bulletin
, Issue.13
-
-
Silverman, R.1
-
35
-
-
84958680532
-
Fast RSA-type cryptosystems using n-adic expansion
-
Advances in Cryptology - CRYPTO'97
-
T. Takagi, "Fast RSA-type cryptosystems using n-adic expansion," Advances in Cryptology - CRYPTO'97, LNCS 1294, pp.372-384, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 372-384
-
-
Takagi, T.1
-
36
-
-
84957625495
-
kq
-
CRYPTO'98
-
kq," CRYPTO'98, LNCS 1462, pp.318-326, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 318-326
-
-
Takagi, T.1
-
37
-
-
0030662908
-
Cryptanalysis of 'less short' RSA secret exponents
-
E. Verheul and H. van Tilborg, "Cryptanalysis of 'less short' RSA secret exponents," Applicable Algebra in Engineering, Communication and Computing, vol.8, pp.425-435, 1997.
-
(1997)
Applicable Algebra in Engineering, Communication and Computing
, vol.8
, pp. 425-435
-
-
Verheul, E.1
Van Tilborg, H.2
-
38
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M.J. Wiener, "Cryptanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, vol.36, no.3, pp.553-558, 1990.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.J.1
-
39
-
-
0347818260
-
Some remarks concerning the M.I.T. public-key cryptosystem
-
H.C. Williams and B. Schmid, "Some remarks concerning the M.I.T. public-key cryptosystem," BIT 19, pp.525-538, 1979.
-
(1979)
BIT
, vol.19
, pp. 525-538
-
-
Williams, H.C.1
Schmid, B.2
|