메뉴 건너뛰기




Volumn , Issue , 2008, Pages 694-701

A new RSA vulnerability using continued fractions

Author keywords

Continued fractions; Coppersmith's method; Lattice basis reduction; Low exponent RSA; RSA; Wiener's attack

Indexed keywords

COMPUTER SYSTEMS;

EID: 50049087279     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AICCSA.2008.4493604     Document Type: Conference Paper
Times cited : (16)

References (22)
  • 1
    • 84958967664 scopus 로고    scopus 로고
    • J. Blömer, A. May Low secret exponent RSA revisited, In Cryptography and Lattices - Proceedings of CALC '01, Lecture Notes in Computer Science, Springer-Verlag 2146, pp. 4-19, 2001.
    • J. Blömer, A. May "Low secret exponent RSA revisited", In Cryptography and Lattices - Proceedings of CALC '01, Lecture Notes in Computer Science, Springer-Verlag 2146, pp. 4-19, 2001.
  • 2
    • 35048880963 scopus 로고    scopus 로고
    • J. Blömer, A. May A generalized Wiener attack on RSA, In Practice and Theory in Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science, Springer-Verlag 2947, pp. 1-13, 2004.
    • J. Blömer, A. May "A generalized Wiener attack on RSA", In Practice and Theory in Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science, Springer-Verlag 2947, pp. 1-13, 2004.
  • 3
    • 0000552770 scopus 로고    scopus 로고
    • Notices of the American Mathematical Society AMS
    • D. Boneh "Twenty years of attacks on the RSA cryptosystem", Notices of the American Mathematical Society (AMS) 46 (2). pp. 203-213, 1999.
    • (1999) Twenty years of attacks on the RSA cryptosystem , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 5
    • 0141473270 scopus 로고    scopus 로고
    • Fast Variants of RSA
    • D. Boneh, H. Snacham "Fast Variants of RSA", CryptoBytes Vol. 5, No. 1, pp. 1-9, 2002.
    • (2002) CryptoBytes , vol.5 , Issue.1 , pp. 1-9
    • Boneh, D.1    Snacham, H.2
  • 6
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations and low exponent vulnerabilities
    • D. Coppersmith "Small solutions to polynomial equations and low exponent vulnerabilities", Journal of Cryptology, Vol. 10(4), pp. 223-260, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.4 , pp. 223-260
    • Coppersmith, D.1
  • 7
    • 24144480649 scopus 로고    scopus 로고
    • Continued fractions and RSA with small secret exponent
    • Math. Publ
    • A. Dujella "Continued fractions and RSA with small secret exponent" Tatra Mt. Math. Publ, 29, pp. 101-112, 2004.
    • (2004) Tatra Mt , vol.29 , pp. 101-112
    • Dujella, A.1
  • 8
    • 84937417845 scopus 로고    scopus 로고
    • G. Durfee, P. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt 99, Advances in Cryptology Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag 1976, pp. 14-29, 2000.
    • G. Durfee, P. Nguyen "Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt 99", Advances in Cryptology Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag 1976, pp. 14-29, 2000.
  • 9
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A. K. Lenstra, H. W. Lenstra, and L. Lovasz "Factoring polynomials with rational coefficients", Mathematische Annalen, Vol. 261, pp. 513-534, 1982.
    • (1982) Mathematische Annalen , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovasz, L.3
  • 11
    • 29144489773 scopus 로고    scopus 로고
    • New RSA Vulnerabilities using Lattics Reduction Methods
    • Ph.D. Dissertation. University of Paderborn
    • A. May "New RSA Vulnerabilities using Lattics Reduction Methods" Ph.D. Dissertation. University of Paderborn. 2003.
    • (2003)
    • May, A.1
  • 13
    • 50049117381 scopus 로고    scopus 로고
    • RSA and a higher degree diophantine equation
    • Submitted
    • A. Nitaj "RSA and a higher degree diophantine equation", Appl. Math. Comput., Submitted.
    • Appl. Math. Comput
    • Nitaj, A.1
  • 14
    • 50049135102 scopus 로고    scopus 로고
    • Application of ECM to a Class of RSA keys
    • submitted
    • A. Nitaj "Application of ECM to a Class of RSA keys", submitted.
    • Nitaj, A.1
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, L. Adleman "A method for obtaining digital signatures and public-key cryptosystems", Communication of ACM 21, pp. 120-126, 1978.
    • (1978) Communication of ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 18
    • 24144496203 scopus 로고    scopus 로고
    • R. Steinfeld, S. Contini, J. Pieprzyk, H. Wang Converse Results to the Wiener Attack on RSA Lecture Notes in Computer Science, Springer-Verlag 3386, pp. 184-198, 2005.
    • R. Steinfeld, S. Contini, J. Pieprzyk, H. Wang "Converse Results to the Wiener Attack on RSA" Lecture Notes in Computer Science, Springer-Verlag 3386, pp. 184-198, 2005.
  • 19
    • 84957625495 scopus 로고    scopus 로고
    • kq Advances in Cryptography - Proceedings of CRYPTO 1998, Lecture Notes in Computer Science series, Springer-Verlag 1462, pp. 318-326, 1998.
    • kq" Advances in Cryptography - Proceedings of CRYPTO 1998, Lecture Notes in Computer Science series, Springer-Verlag 1462, pp. 318-326, 1998.
  • 22
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M. Wiener "Cryptanalysis of short RSA secret exponents", IEEE Transactions on Information Theory, Vol. 36, pp. 553-558, 1990.
    • (1990) IEEE Transactions on Information Theory , vol.36 , pp. 553-558
    • Wiener, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.