-
1
-
-
84958967664
-
Low secret exponent; RSA revisited
-
Cryptography and Lattices - Proceedings of CALC '01. Springer-Verlag
-
J. Blöiner and A. May. Low secret exponent; RSA revisited. In Cryptography and Lattices - Proceedings of CALC '01, volume 2146 of Lecture Notes in Computer Science, pages 4-19. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2146
, pp. 4-19
-
-
Blöiner, J.1
May, A.2
-
2
-
-
35248863066
-
New partial key exposure attacks on RSA
-
Advances m Cryptology - Proceedings of CRYPTO 2003. Springer-Verlag
-
J. Blöiner and A. May. New partial key exposure attacks on RSA. In Advances m Cryptology - Proceedings of CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 27-43. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 27-43
-
-
Blöiner, J.1
May, A.2
-
3
-
-
84957672468
-
0.292
-
Advances in Cryptology - Proceedings of EUROCRYPT '99. Springer-Verlag
-
0.292. In Advances in Cryptology - Proceedings of EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 1-11. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 1-11
-
-
Boneh, D.1
Durfee, G.2
-
5
-
-
84947735905
-
An attack on RSA given a small fraction of the private key bits
-
Advances in Cryptology - Proceedings of ASIACRYPT '98. Springer-Verlag
-
D. Boneh, G. Durfee, and Y. Frankel. An attack on RSA given a small fraction of the private key bits. In Advances in Cryptology - Proceedings of ASIACRYPT '98, volume 1514 of Lecture Notes in Computer Science, pages 25-34. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 25-34
-
-
Boneh, D.1
Durfee, G.2
Frankel, Y.3
-
7
-
-
0141473270
-
Fast variants of RSA
-
D. Boneh and H. Shacham. Fast variants of RSA. Cryptobytes, 5(1):l-9, 2002.
-
(2002)
Cryptobytes
, vol.5
, Issue.1
-
-
Boneh, D.1
Shacham, H.2
-
8
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10(4):233-260, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
9
-
-
24944529717
-
Finding small roots of bivariate integer polynomial equations revisited
-
Advances in Cryptology - Proceedings of EUROCRYPT 2004. Springer-Verlag
-
J.-S. Coron. Finding small roots of bivariate integer polynomial equations revisited. In Advances in Cryptology - Proceedings of EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 492-505. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 492-505
-
-
Coron, J.-S.1
-
10
-
-
24144480649
-
Continued fractions and RSA with small secret exponent
-
A. Dujella. Continued fractions and RSA with small secret exponent. Tatra Mt. Math. Publ., 29:101-112, 2004.
-
(2004)
Tatra Mt. Math. Publ.
, vol.29
, pp. 101-112
-
-
Dujella, A.1
-
11
-
-
24944544867
-
Partial key exposure attacks on RSA up to full size exponents
-
Advances in Cryptology - Proceedings of EUROCRYPT 2005. Springer-Verlag
-
M. Ernst, E. Jochemsz, A. May, arid B. de Weger. Partial key exposure attacks on RSA up to full size exponents. In Advances in Cryptology - Proceedings of EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 371-387. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 371-387
-
-
Ernst, M.1
Jochemsz, E.2
May, A.3
De Weger, A.B.4
-
12
-
-
26444467031
-
Tunable balancing of RSA
-
Information Security and Privacy, 10th Australasian Conference, ACISP 2005. Springer
-
S. D. Galbraith, C. Heneghan, and J. F. McKee. Tunable balancing of RSA. In Information Security and Privacy, 10th Australasian Conference, ACISP 2005, volume 3574 of Lecture Notes in Computer Science, pages 280-292. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 280-292
-
-
Galbraith, S.D.1
Heneghan, C.2
McKee, J.F.3
-
13
-
-
85043791322
-
An identity-based identification scheme based on discrete logorithms modulo a composite number
-
Advances in Cryptology - Proceedings of EUROCRYPT '90. Springer-Verlag
-
M. Girault, An identity-based identification scheme based on discrete logorithms modulo a composite number. In Advances in Cryptology - Proceedings of EUROCRYPT '90, volume 473 of Lecture Notes in Computer Science, pages 481-486. Springer-Verlag, 1991
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 481-486
-
-
Girault, M.1
-
14
-
-
84949226531
-
Finding small roots of univariate modular equations revisited
-
Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings. Springer-Verlag
-
N. A. Howgrave-Graham. Finding small roots of univariate modular equations revisited. In Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings, volume 1355 of Lecture Notes in Computer Science, pages 131-142. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1355
, pp. 131-142
-
-
Howgrave-Graham, N.A.1
-
15
-
-
84946820591
-
Unbelievable security : Matching AES security using public key systems
-
Advances in Cryptology - Proceedings of ASIACRYPT 2001. Springer-Verlag
-
A. K. Lenstra. Unbelievable security : Matching AES security using public key systems. In Advances in Cryptology - Proceedings of ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 67-86. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 67-86
-
-
Lenstra, A.K.1
-
16
-
-
84957648348
-
Security and performance of server-aided RSA computation protocols
-
Advances in Cryptology - Proceedings of CRYPTO '95. Springer-Verlag
-
C. H. Lim and P. J. Lee. Security and performance of server-aided RSA computation protocols. In Advances in Cryptology - Proceedings of CRYPTO '95, volume 963 of Lecture Notes in Computer Science, pages 70-83. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 70-83
-
-
Lim, C.H.1
Lee, P.J.2
-
17
-
-
84937420618
-
Cryptanalysis of unbalanced RSA with small CRT-exponent
-
Advances in Cryptology - Proceedings of CRYPTO 2002. Springer-Verlag
-
A. May. Cryptanalysis of unbalanced RSA with small CRT-exponent. In Advances in Cryptology - Proceedings of CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 242-256. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 242-256
-
-
May, A.1
-
18
-
-
24944472824
-
rq
-
Public Key Cryptograph - PKC 2004. Springer-Verlag
-
rq. In Public Key Cryptograph - PKC 2004, volume 2947 of Lecture Notes in Computer Science, pages 218-230. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2947
, pp. 218-230
-
-
May, A.1
-
20
-
-
0017930809
-
A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun, of the ACM, 21:120-126, 1978.
-
(1978)
Commun, of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
-
21
-
-
24144496203
-
Converse results to the Wiener attack on RSA
-
Public Key Cryptography - PKC 2005. Springer-Verlag
-
R. Steinfeld, S. Contini, H. Wang, and J. Pieprzyk. Converse results to the Wiener attack on RSA. In Public Key Cryptography - PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 184-198. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 184-198
-
-
Steinfeld, R.1
Contini, S.2
Wang, H.3
Pieprzyk, J.4
-
22
-
-
33745674148
-
On the design of rebalanced RSA-CRT
-
Centre for Applied Cryptographic Research, University of Waterloo
-
H.-M. Sun, M. J. Hinek, and M.-E. Wu. On the design of rebalanced RSA-CRT. Technical Report CACR 2005-35, Centre for Applied Cryptographic Research, University of Waterloo, 2005. http://www.cacr.math.uwaterloo.ca/.
-
(2005)
Technical Report
, vol.CACR 2005-35
-
-
Sun, H.-M.1
Hinek, M.J.2
Wu, M.-E.3
-
23
-
-
77950337064
-
An approach towards rebalanced RSA-CRT with short public exponent
-
H.-M. Sun and M.-E. Wu. An approach towards rebalanced RSA-CRT with short public exponent. Cryptology ePrint Archive, Report 2005/053, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.53
-
-
Sun, H.-M.1
Wu, M.-E.2
-
24
-
-
24144440984
-
RSA with balanced short exponents and its application to entity authentication
-
Public Key Cryptography - PKC 2005. Springer-Verlag
-
H.-M. Sun and C.-T. Yang. RSA with balanced short exponents and its application to entity authentication. In Public Key Cryptography - PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 199-215. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 199-215
-
-
Sun, H.-M.1
Yang, C.-T.2
-
26
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener. Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory, 36(3):553-558, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.1
|