메뉴 건너뛰기




Volumn 3960 LNCS, Issue , 2006, Pages 82-98

Another look at small RSA exponents

Author keywords

[No Author keywords available]

Indexed keywords

DATA STORAGE EQUIPMENT; INFORMATION ANALYSIS; PUBLIC KEY CRYPTOGRAPHY; ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 33745658869     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11605805_6     Document Type: Conference Paper
Times cited : (27)

References (27)
  • 1
    • 84958967664 scopus 로고    scopus 로고
    • Low secret exponent; RSA revisited
    • Cryptography and Lattices - Proceedings of CALC '01. Springer-Verlag
    • J. Blöiner and A. May. Low secret exponent; RSA revisited. In Cryptography and Lattices - Proceedings of CALC '01, volume 2146 of Lecture Notes in Computer Science, pages 4-19. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2146 , pp. 4-19
    • Blöiner, J.1    May, A.2
  • 2
    • 35248863066 scopus 로고    scopus 로고
    • New partial key exposure attacks on RSA
    • Advances m Cryptology - Proceedings of CRYPTO 2003. Springer-Verlag
    • J. Blöiner and A. May. New partial key exposure attacks on RSA. In Advances m Cryptology - Proceedings of CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 27-43. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 27-43
    • Blöiner, J.1    May, A.2
  • 3
    • 84957672468 scopus 로고    scopus 로고
    • 0.292
    • Advances in Cryptology - Proceedings of EUROCRYPT '99. Springer-Verlag
    • 0.292. In Advances in Cryptology - Proceedings of EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 1-11. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 1-11
    • Boneh, D.1    Durfee, G.2
  • 5
    • 84947735905 scopus 로고    scopus 로고
    • An attack on RSA given a small fraction of the private key bits
    • Advances in Cryptology - Proceedings of ASIACRYPT '98. Springer-Verlag
    • D. Boneh, G. Durfee, and Y. Frankel. An attack on RSA given a small fraction of the private key bits. In Advances in Cryptology - Proceedings of ASIACRYPT '98, volume 1514 of Lecture Notes in Computer Science, pages 25-34. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 25-34
    • Boneh, D.1    Durfee, G.2    Frankel, Y.3
  • 7
    • 0141473270 scopus 로고    scopus 로고
    • Fast variants of RSA
    • D. Boneh and H. Shacham. Fast variants of RSA. Cryptobytes, 5(1):l-9, 2002.
    • (2002) Cryptobytes , vol.5 , Issue.1
    • Boneh, D.1    Shacham, H.2
  • 8
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10(4):233-260, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 9
    • 24944529717 scopus 로고    scopus 로고
    • Finding small roots of bivariate integer polynomial equations revisited
    • Advances in Cryptology - Proceedings of EUROCRYPT 2004. Springer-Verlag
    • J.-S. Coron. Finding small roots of bivariate integer polynomial equations revisited. In Advances in Cryptology - Proceedings of EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 492-505. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 492-505
    • Coron, J.-S.1
  • 10
    • 24144480649 scopus 로고    scopus 로고
    • Continued fractions and RSA with small secret exponent
    • A. Dujella. Continued fractions and RSA with small secret exponent. Tatra Mt. Math. Publ., 29:101-112, 2004.
    • (2004) Tatra Mt. Math. Publ. , vol.29 , pp. 101-112
    • Dujella, A.1
  • 11
    • 24944544867 scopus 로고    scopus 로고
    • Partial key exposure attacks on RSA up to full size exponents
    • Advances in Cryptology - Proceedings of EUROCRYPT 2005. Springer-Verlag
    • M. Ernst, E. Jochemsz, A. May, arid B. de Weger. Partial key exposure attacks on RSA up to full size exponents. In Advances in Cryptology - Proceedings of EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 371-387. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 371-387
    • Ernst, M.1    Jochemsz, E.2    May, A.3    De Weger, A.B.4
  • 12
    • 26444467031 scopus 로고    scopus 로고
    • Tunable balancing of RSA
    • Information Security and Privacy, 10th Australasian Conference, ACISP 2005. Springer
    • S. D. Galbraith, C. Heneghan, and J. F. McKee. Tunable balancing of RSA. In Information Security and Privacy, 10th Australasian Conference, ACISP 2005, volume 3574 of Lecture Notes in Computer Science, pages 280-292. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 280-292
    • Galbraith, S.D.1    Heneghan, C.2    McKee, J.F.3
  • 13
    • 85043791322 scopus 로고
    • An identity-based identification scheme based on discrete logorithms modulo a composite number
    • Advances in Cryptology - Proceedings of EUROCRYPT '90. Springer-Verlag
    • M. Girault, An identity-based identification scheme based on discrete logorithms modulo a composite number. In Advances in Cryptology - Proceedings of EUROCRYPT '90, volume 473 of Lecture Notes in Computer Science, pages 481-486. Springer-Verlag, 1991
    • (1991) Lecture Notes in Computer Science , vol.473 , pp. 481-486
    • Girault, M.1
  • 14
    • 84949226531 scopus 로고    scopus 로고
    • Finding small roots of univariate modular equations revisited
    • Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings. Springer-Verlag
    • N. A. Howgrave-Graham. Finding small roots of univariate modular equations revisited. In Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings, volume 1355 of Lecture Notes in Computer Science, pages 131-142. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1355 , pp. 131-142
    • Howgrave-Graham, N.A.1
  • 15
    • 84946820591 scopus 로고    scopus 로고
    • Unbelievable security : Matching AES security using public key systems
    • Advances in Cryptology - Proceedings of ASIACRYPT 2001. Springer-Verlag
    • A. K. Lenstra. Unbelievable security : Matching AES security using public key systems. In Advances in Cryptology - Proceedings of ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 67-86. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 67-86
    • Lenstra, A.K.1
  • 16
    • 84957648348 scopus 로고
    • Security and performance of server-aided RSA computation protocols
    • Advances in Cryptology - Proceedings of CRYPTO '95. Springer-Verlag
    • C. H. Lim and P. J. Lee. Security and performance of server-aided RSA computation protocols. In Advances in Cryptology - Proceedings of CRYPTO '95, volume 963 of Lecture Notes in Computer Science, pages 70-83. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 70-83
    • Lim, C.H.1    Lee, P.J.2
  • 17
    • 84937420618 scopus 로고    scopus 로고
    • Cryptanalysis of unbalanced RSA with small CRT-exponent
    • Advances in Cryptology - Proceedings of CRYPTO 2002. Springer-Verlag
    • A. May. Cryptanalysis of unbalanced RSA with small CRT-exponent. In Advances in Cryptology - Proceedings of CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 242-256. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 242-256
    • May, A.1
  • 18
    • 24944472824 scopus 로고    scopus 로고
    • rq
    • Public Key Cryptograph - PKC 2004. Springer-Verlag
    • rq. In Public Key Cryptograph - PKC 2004, volume 2947 of Lecture Notes in Computer Science, pages 218-230. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2947 , pp. 218-230
    • May, A.1
  • 20
    • 0017930809 scopus 로고
    • A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun, of the ACM, 21:120-126, 1978.
    • (1978) Commun, of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1
  • 21
    • 24144496203 scopus 로고    scopus 로고
    • Converse results to the Wiener attack on RSA
    • Public Key Cryptography - PKC 2005. Springer-Verlag
    • R. Steinfeld, S. Contini, H. Wang, and J. Pieprzyk. Converse results to the Wiener attack on RSA. In Public Key Cryptography - PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 184-198. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 184-198
    • Steinfeld, R.1    Contini, S.2    Wang, H.3    Pieprzyk, J.4
  • 22
    • 33745674148 scopus 로고    scopus 로고
    • On the design of rebalanced RSA-CRT
    • Centre for Applied Cryptographic Research, University of Waterloo
    • H.-M. Sun, M. J. Hinek, and M.-E. Wu. On the design of rebalanced RSA-CRT. Technical Report CACR 2005-35, Centre for Applied Cryptographic Research, University of Waterloo, 2005. http://www.cacr.math.uwaterloo.ca/.
    • (2005) Technical Report , vol.CACR 2005-35
    • Sun, H.-M.1    Hinek, M.J.2    Wu, M.-E.3
  • 23
    • 77950337064 scopus 로고    scopus 로고
    • An approach towards rebalanced RSA-CRT with short public exponent
    • H.-M. Sun and M.-E. Wu. An approach towards rebalanced RSA-CRT with short public exponent. Cryptology ePrint Archive, Report 2005/053, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.53
    • Sun, H.-M.1    Wu, M.-E.2
  • 24
    • 24144440984 scopus 로고    scopus 로고
    • RSA with balanced short exponents and its application to entity authentication
    • Public Key Cryptography - PKC 2005. Springer-Verlag
    • H.-M. Sun and C.-T. Yang. RSA with balanced short exponents and its application to entity authentication. In Public Key Cryptography - PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 199-215. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 199-215
    • Sun, H.-M.1    Yang, C.-T.2
  • 26
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M. Wiener. Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory, 36(3):553-558, 1990.
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.