메뉴 건너뛰기




Volumn 2612, Issue , 2003, Pages 403-416

Simple backdoors for RSA key generation

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 35048854557     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36563-x_28     Document Type: Article
Times cited : (26)

References (16)
  • 1
    • 0034226114 scopus 로고    scopus 로고
    • Cryptanalysis of RSA with private key d less than no.292
    • D. BONEH AND G. DURFEE, Cryptanalysis of RSA with private key d less than no.292, Information Theory, IEEE Transactions on, 46 (2000), pp. 1339-1349.
    • (2000) Information Theory, IEEE Transactions on , vol.46 , pp. 1339-1349
    • Boneh, D.1    Durfee, G.2
  • 2
    • 84947735905 scopus 로고    scopus 로고
    • An attack on RSA given a small fraction of the private key bits
    • Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, Springer-Verlag
    • D. BONEH, G. DURFEE, AND Y. FRANKEL, An attack on RSA given a small fraction of the private key bits, in Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, 1998, Springer-Verlag, pp. 25-34. Lecture Notes in Computer Science Volume 1514.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 25-34
    • Boneh, D.1    Durfee, G.2    Frankel, Y.3
  • 3
    • 84947916423 scopus 로고    scopus 로고
    • Finding a small root of a bivariate integer equation; factoring with high bits known
    • Advances in Cryptology - EuroCrypt '96, U. Maurer, ed., Berlin, Springer-Verlag
    • D. COPPERSMITH, Finding a small root of a bivariate integer equation; factoring with high bits known, in Advances in Cryptology - EuroCrypt '96, U. Maurer, ed., Berlin, 1996, Springer-Verlag, pp. 178-189. Lecture Notes in Computer Science Volume 1070.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 178-189
    • Coppersmith, D.1
  • 6
    • 68549095981 scopus 로고    scopus 로고
    • Efficient generation of prime numbers
    • CHES 2000, Ç. K. Koç and C. Paar, eds., Berlin, Springer-Verlag
    • M. JOYE, P. PAILLIER, AND S. VAUDENAY, Efficient generation of prime numbers, in CHES 2000, Ç. K. Koç and C. Paar, eds., Berlin, 2000, Springer-Verlag, pp. 340-354. Lecture Notes in Computer Science Volume 1965.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 340-354
    • Joye, M.1    Paillier, P.2    Vaudenay, S.3
  • 7
    • 84947730183 scopus 로고    scopus 로고
    • Generating RSA moduli with a predetermined portion
    • Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, Springer-Verlag
    • A. K. LENSTRA, Generating RSA moduli with a predetermined portion, in Advances in Cryptology - AsiaCrypt '98, K. Ohta and D. Pei, eds., Berlin, 1998, Springer-Verlag, pp. 1-10. Lecture Notes in Computer Science Volume 1514.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 1-10
    • Lenstra, A.K.1
  • 8
    • 0017217375 scopus 로고
    • Riemann's hypothesis and tests for primality
    • G. L. MILLER, Riemann's hypothesis and tests for primality, J. Comput. System Sci., 13 (1976), pp. 300-317.
    • (1976) J. Comput. System Sci. , vol.13 , pp. 300-317
    • Miller, G.L.1
  • 9
    • 35248817671 scopus 로고
    • Efficient factoring based on partial information
    • Advances in Cryptology - EuroCrypt '85, F. Pichler, ed., Berlin, Springer-Verlag
    • R. L. RIVEST AND A. SHAMIR, Efficient factoring based on partial information., in Advances in Cryptology - EuroCrypt '85, F. Pichler, ed., Berlin, 1985, Springer-Verlag, pp. 31-34. Lecture Notes in Computer Science Volume 219.
    • (1985) Lecture Notes in Computer Science , vol.219 , pp. 31-34
    • Rivest, R.L.1    Shamir, A.2
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. RIVEST, A. SHAMIR, AND L. M. ADLEMAN, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, 21 (1978), pp. 120-126.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 12
    • 35248857726 scopus 로고    scopus 로고
    • Private e-mail communication., 2 may
    • S. VAUDENAY, Private e-mail communication., 2 may 2001.
    • (2001)
    • Vaudenay, S.1
  • 13
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M. WIENER, Cryptanalysis of short RSA secret exponents, Information Theory, IEEE Transactions on, 36 (1990), pp. 553-558.
    • (1990) Information Theory, IEEE Transactions on , vol.36 , pp. 553-558
    • Wiener, M.1
  • 14
    • 84955586344 scopus 로고    scopus 로고
    • The dark side of "black-box" cryptography, or: Should we trust Capstone?
    • Advances in Cryptology - Crypto '96, N. Koblitz, ed., Berlin, Springer-Verlag
    • A. YOUNG AND M. YUNG, The dark side of "black-box" cryptography, or: Should we trust Capstone?, in Advances in Cryptology - Crypto '96, N. Koblitz, ed., Berlin, 1996, Springer-Verlag, pp. 89-103. Lecture Notes in Computer Science Volume 1109.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 89-103
    • Young, A.1    Yung, M.2
  • 15
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using cryptography against cryptography
    • Advances in Cryptology - EuroCrypt '97, W. Fumy, ed., Berlin, Springer-Verlag
    • _, Kleptography: Using cryptography against cryptography, in Advances in Cryptology - EuroCrypt '97, W. Fumy, ed., Berlin, 1997, Springer-Verlag, pp. 62-74. Lecture Notes in Computer Science Volume 1233.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 62-74
  • 16
    • 84958645678 scopus 로고    scopus 로고
    • The prevalence of kleptographic attacks on discrete-log based cryptosystems
    • Advances in Cryptology - Crypto '97, B. Kaliski, ed., Berlin, Springer-Verlag
    • _, The prevalence of kleptographic attacks on discrete-log based cryptosystems, in Advances in Cryptology - Crypto '97, B. Kaliski, ed., Berlin, 1997, Springer-Verlag, pp. 264-276. Lecture Notes in Computer Science Volume 1294.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 264-276


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.