메뉴 건너뛰기




Volumn 20, Issue 1, 2007, Pages 39-50

Deterministic polynomial-time equivalence of computing the RSA secret key and factoring

Author keywords

Coppersmith's theorem; RSA

Indexed keywords

PROBABILISTIC POLYNOMIAL TIME ALGORITHM; RSA CRYPTOSYSTEM; UNIVARIATE MODULAR POLYNOMIALS;

EID: 33846874546     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-006-0433-6     Document Type: Article
Times cited : (60)

References (12)
  • 1
    • 84957045680 scopus 로고    scopus 로고
    • r q for large r, Proceedings of Crypto '99, pp. 326-337. LNCS, 1666. Springer-Verlag, Berlin, 1999.
    • r q for large r, Proceedings of Crypto '99, pp. 326-337. LNCS, Vol. 1666. Springer-Verlag, Berlin, 1999.
  • 2
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations and low exponent vulnerabilities
    • D. Coppersmith, Small solutions to polynomial equations and low exponent vulnerabilities, Journal of Cryptology, Vol. 10, No. 4, pp. 223-260, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.4 , pp. 223-260
    • Coppersmith, D.1
  • 3
    • 84937417845 scopus 로고    scopus 로고
    • Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt '99
    • Proceedings of Asiacrypt, Springer-Verlag, Berlin
    • G. Durfee and P. Nguyen, Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt '99, Proceedings of Asiacrypt 2000, pp. 14-29. LNCS, Vol. 1976. Springer-Verlag, Berlin, 2000.
    • (2000) LNCS , vol.1976 , pp. 14-29
    • Durfee, G.1    Nguyen, P.2
  • 4
    • 84949226531 scopus 로고    scopus 로고
    • Finding small roots of univariate modular equations revisited
    • Proceedings of Cryptography and Coding, pp, Springer-Verlag, Berlin
    • N. Howgrave-Graham, Finding small roots of univariate modular equations revisited, Proceedings of Cryptography and Coding, pp. 131-142. LNCS, Vol. 1355. Springer-Verlag, Berlin, 1997.
    • (1997) LNCS , vol.1355 , pp. 131-142
    • Howgrave-Graham, N.1
  • 5
    • 84958958450 scopus 로고    scopus 로고
    • Approximate integer common divisors
    • Proceedings of CALC '01, pp, Springer-Verlag, Berlin
    • N. Howgrave-Graham, Approximate integer common divisors, Proceedings of CALC '01, pp. 51-66. LNCS, Vol. 2146. Springer-Verlag, Berlin, 2001.
    • (2001) LNCS , vol.2146 , pp. 51-66
    • Howgrave-Graham, N.1
  • 6
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A. K. Lenstra, H. W. Lenstra and L. Lovász, Factoring polynomials with rational coefficients, Mathematische Annal en, Vol. 261, pp. 513-534, 1982
    • (1982) Mathematische Annal en , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovász, L.3
  • 7
    • 35048868333 scopus 로고    scopus 로고
    • Computing the RSA secret key is deterministic polynomial time equivalent to factoring
    • Proceedings of Crypto, Springer-Verlag, Berlin
    • A. May, Computing the RSA secret key is deterministic polynomial time equivalent to factoring, Proceedings of Crypto 2004, pp. 213-219. LNCS, Vol. 3152. Springer-Verlag, Berlin, 2004.
    • (2004) LNCS , vol.3152 , pp. 213-219
    • May, A.1
  • 9
    • 24944584767 scopus 로고    scopus 로고
    • Floating-point LLL revisited
    • Proceedings of Eurocrypt, Springer-Verlag, Berlin
    • P. Nguyen and D. Stehlé, Floating-point LLL revisited, Proceedings of Eurocrypt 2005, pp. 215-233. LNCS, Vol. 3494. Springer-Verlag, Berlin, 2005.
    • (2005) LNCS , vol.3494 , pp. 215-233
    • Nguyen, P.1    Stehlé, D.2
  • 10
    • 33846867921 scopus 로고    scopus 로고
    • The two faces of lattices in cryptology
    • Proceedings of CALC '01, pp, Springer-Verlag, Berlin
    • P.Q. Nguyen and J. Stern, The two faces of lattices in cryptology, Proceedings of CALC '01, pp. 146-180. LNCS, Vol. 2146. Springer-Verlag, Berlin, 2001.
    • (2001) LNCS , vol.2146 , pp. 146-180
    • Nguyen, P.Q.1    Stern, J.2
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.