-
1
-
-
0034226114
-
Cryptanalysis of RSA with private key d less than no.292
-
D. BONEH AND G. DURFEE, Cryptanalysis of RSA with private key d less than no.292, Information Theory, IEEE Transactions on, 46 (2000), pp. 1339-1349.
-
(2000)
Information Theory, IEEE Transactions on
, vol.46
, pp. 1339-1349
-
-
Boneh, D.1
Durfee, G.2
-
2
-
-
84947735905
-
An attack on RSA given a small fraction of the private key bits
-
Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, Springer-Verlag
-
D. BONEH, G. DURFEE, AND Y. FRANKEL, An attack on RSA given a small fraction of the private key bits, in Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, 1998, Springer-Verlag, pp. 25-34. Lecture Notes in Computer Science Volume 1514.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 25-34
-
-
Boneh, D.1
Durfee, G.2
Frankel, Y.3
-
3
-
-
84947916423
-
Finding a small root of a bivariate integer equation; factoring with high bits known
-
Advances in Cryptology - EuroCrypt '96, U. Maurer, ed., Berlin, Springer-Verlag
-
D. COPPERSMITH, Finding a small root of a bivariate integer equation; factoring with high bits known, in Advances in Cryptology - EuroCrypt '96, U. Maurer, ed., Berlin, 1996, Springer-Verlag, pp. 178-189. Lecture Notes in Computer Science Volume 1070.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 178-189
-
-
Coppersmith, D.1
-
6
-
-
68549095981
-
Efficient generation of prime numbers
-
CHES 2000, Ç. K. Koç and C. Paar, eds., Berlin, Springer-Verlag
-
M. JOYE, P. PAILLIER, AND S. VAUDENAY, Efficient generation of prime numbers, in CHES 2000, Ç. K. Koç and C. Paar, eds., Berlin, 2000, Springer-Verlag, pp. 340-354. Lecture Notes in Computer Science Volume 1965.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 340-354
-
-
Joye, M.1
Paillier, P.2
Vaudenay, S.3
-
7
-
-
84947730183
-
Generating RSA moduli with a predetermined portion
-
Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, Springer-Verlag
-
A. K. LENSTRA, Generating RSA moduli with a predetermined portion, in Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, 1998, Springer-Verlag, pp. 1-10. Lecture Notes in Computer Science Volume 1514.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 1-10
-
-
Lenstra, A.K.1
-
8
-
-
0017217375
-
Riemann's hypothesis and tests for primality
-
G. L. MILLER, Riemann's hypothesis and tests for primality, J. Comput. System Sci., 13 (1976), pp. 300-317.
-
(1976)
J. Comput. System Sci.
, vol.13
, pp. 300-317
-
-
Miller, G.L.1
-
9
-
-
35248817671
-
Efficient factoring based on partial information
-
Advances in Cryptology - EuroCrypt '85, F. Pichler, ed., Berlin, Springer-Verlag
-
R. L. RIVEST AND A. SHAMIR, Efficient factoring based on partial information., in Advances in Cryptology - EuroCrypt '85, F. Pichler, ed., Berlin, 1985, Springer-Verlag, pp. 31-34. Lecture Notes in Computer Science Volume 219.
-
(1985)
Lecture Notes in Computer Science
, vol.219
, pp. 31-34
-
-
Rivest, R.L.1
Shamir, A.2
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. RIVEST, A. SHAMIR, AND L. M. ADLEMAN, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, 21 (1978), pp. 120-126.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
12
-
-
35248857726
-
-
Private e-mail communication., 2 may
-
S. VAUDENAY, Private e-mail communication., 2 may 2001.
-
(2001)
-
-
Vaudenay, S.1
-
13
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. WIENER, Cryptanalysis of short RSA secret exponents, Information Theory, IEEE Transactions on, 36 (1990), pp. 553-558.
-
(1990)
Information Theory, IEEE Transactions on
, vol.36
, pp. 553-558
-
-
Wiener, M.1
-
14
-
-
84955586344
-
The dark side of "black-box" cryptography, or: Should we trust Capstone?
-
Advances in Cryptology - Crypto '96, N. Koblitz, ed., Berlin, Springer-Verlag
-
A. YOUNG AND M. YUNG, The dark side of "black-box" cryptography, or: Should we trust Capstone?, in Advances in Cryptology - Crypto '96, N. Koblitz, ed., Berlin, 1996, Springer-Verlag, pp. 89-103. Lecture Notes in Computer Science Volume 1109.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 89-103
-
-
Young, A.1
Yung, M.2
-
15
-
-
84957360674
-
Kleptography: Using cryptography against cryptography
-
Advances in Cryptology - EuroCrypt '97, W. Fumy, ed., Berlin, Springer-Verlag
-
_, Kleptography: Using cryptography against cryptography, in Advances in Cryptology - EuroCrypt '97, W. Fumy, ed., Berlin, 1997, Springer-Verlag, pp. 62-74. Lecture Notes in Computer Science Volume 1233.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 62-74
-
-
-
16
-
-
84958645678
-
The prevalence of kleptographic attacks on discrete-log based cryptosystems
-
Advances in Cryptology - Crypto '97, B. Kaliski, ed., Berlin, Springer-Verlag
-
_, The prevalence of kleptographic attacks on discrete-log based cryptosystems, in Advances in Cryptology - Crypto '97, B. Kaliski, ed., Berlin, 1997, Springer-Verlag, pp. 264-276. Lecture Notes in Computer Science Volume 1294.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 264-276
-
-
|