-
2
-
-
84947735905
-
An attack on RSA given a small fraction of the private key bits
-
Advances in Cryptology - AsiaCrypt '98, Springer-Verlag
-
D. Boneh, G. Durfee, Y. Frankel, "An attack on RSA given a small fraction of the private key bits", Advances in Cryptology - AsiaCrypt '98, Lecture Notes in Computer Science Vol. 1514, Springer-Verlag, pp. 25-34, 1998
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 25-34
-
-
Boneh, D.1
Durfee, G.2
Frankel, Y.3
-
3
-
-
84957045680
-
rq for large r
-
Advances in Cryptology - Crypto '99, Springer-Verlag
-
rq for large r", Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science Vol. 1666, Springer-Verlag, pp. 326-337, 1999
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 326-337
-
-
Boneh, D.1
Durfee, G.2
Howgrave-Graham, N.3
-
4
-
-
35248863066
-
New Partial Key Exposure Attacks on RSA
-
Advances in Cryptology - Crypto 2003, Springer Verlag
-
J. Blömer, A. May, "New Partial Key Exposure Attacks on RSA", Advances in Cryptology - Crypto 2003, Lecture Notes in Computer Science Vol. 2729, pp. 27-43, Springer Verlag, 2003
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 27-43
-
-
Blömer, J.1
May, A.2
-
5
-
-
0001494997
-
Small solutions to polynomial equations and low exponent vulnerabilities
-
D. Coppersmith, "Small solutions to polynomial equations and low exponent vulnerabilities", Journal of Cryptology, Vol. 10(4), pp. 223-260, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 223-260
-
-
Coppersmith, D.1
-
6
-
-
84974680547
-
ESIGN: An Efficient Digital Signature Implementation for Smartcards
-
Advances in Cryptology - Eurocrypt '91, Springer Verlag
-
A. Fujioke, T. Okamoto, Miyaguchi, "ESIGN: An Efficient Digital Signature Implementation for Smartcards", Advances in Cryptology - Eurocrypt '91, Lecture Notes in Computer Science Vol. 547, Springer Verlag, pp. 446-457, 1991
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 446-457
-
-
Fujioke, A.1
Okamoto, T.2
Miyaguchi3
-
7
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
-
Advances in Cryptology - Crypto '96, Springer Verlag
-
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems", Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science Vol. 1109, Springer Verlag, pp. 104-113, 1996
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
8
-
-
84939573910
-
Differential power analysis
-
Advances in Cryptology - Crypto '99, Springer Verlag
-
P. Kocher, J. Jaffe and B. Jun, "Differential power analysis", Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science Vol. 1666, Springer Verlag, pp. 388-397, 1999
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
84956852274
-
A new public key cryptosystem as secure as factoring
-
Advances in Cryptology - Eurocrypt '98, Springer Verlag
-
T. Okamoto, S. Uchiyama, "A new public key cryptosystem as secure as factoring", Advances in Cryptology - Eurocrypt '98, Lecture Notes in Computer Science Vol. 1403, Springer Verlag, pp. 308-318, 1998
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
11
-
-
84957625495
-
kq
-
Advances in Cryptology - Crypto '98, Springer-Verlag
-
kq", Advances in Cryptology - Crypto '98, Lecture Notes in Computer Science Vol. 1462, Springer-Verlag, pp.318-326, 1998
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 318-326
-
-
Takagi, T.1
-
12
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener, "Cryptanalysis of short RSA secret exponents", IEEE Transactions on Information Theory, Vol. 36, pp. 553-558, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.36
, pp. 553-558
-
-
Wiener, M.1
|