-
1
-
-
84958967664
-
-
J. Blömer, A. May Low secret exponent RSA revisited, In Cryptography and Lattices - Proceedings of CALC '01, Lecture Notes in Computer Science, Springer-Verlag 2146, pp. 4-19, 2001.
-
J. Blömer, A. May "Low secret exponent RSA revisited", In Cryptography and Lattices - Proceedings of CALC '01, Lecture Notes in Computer Science, Springer-Verlag 2146, pp. 4-19, 2001.
-
-
-
-
2
-
-
35048880963
-
-
J. Blömer, A. May A generalized Wiener attack on RSA, In Practice and Theory in Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science, Springer-Verlag 2947, pp. 1-13, 2004.
-
J. Blömer, A. May "A generalized Wiener attack on RSA", In Practice and Theory in Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science, Springer-Verlag 2947, pp. 1-13, 2004.
-
-
-
-
3
-
-
0000552770
-
-
Notices of the American Mathematical Society AMS
-
D. Boneh "Twenty years of attacks on the RSA cryptosystem", Notices of the American Mathematical Society (AMS) 46 (2). pp. 203-213, 1999.
-
(1999)
Twenty years of attacks on the RSA cryptosystem
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
5
-
-
0141473270
-
Fast Variants of RSA
-
D. Boneh, H. Snacham "Fast Variants of RSA", CryptoBytes Vol. 5, No. 1, pp. 1-9, 2002.
-
(2002)
CryptoBytes
, vol.5
, Issue.1
, pp. 1-9
-
-
Boneh, D.1
Snacham, H.2
-
6
-
-
0001494997
-
Small solutions to polynomial equations and low exponent vulnerabilities
-
D. Coppersmith "Small solutions to polynomial equations and low exponent vulnerabilities", Journal of Cryptology, Vol. 10(4), pp. 223-260, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 223-260
-
-
Coppersmith, D.1
-
7
-
-
24144480649
-
Continued fractions and RSA with small secret exponent
-
Math. Publ
-
A. Dujella "Continued fractions and RSA with small secret exponent" Tatra Mt. Math. Publ, 29, pp. 101-112, 2004.
-
(2004)
Tatra Mt
, vol.29
, pp. 101-112
-
-
Dujella, A.1
-
8
-
-
84937417845
-
-
G. Durfee, P. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt 99, Advances in Cryptology Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag 1976, pp. 14-29, 2000.
-
G. Durfee, P. Nguyen "Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt 99", Advances in Cryptology Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag 1976, pp. 14-29, 2000.
-
-
-
-
9
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A. K. Lenstra, H. W. Lenstra, and L. Lovasz "Factoring polynomials with rational coefficients", Mathematische Annalen, Vol. 261, pp. 513-534, 1982.
-
(1982)
Mathematische Annalen
, vol.261
, pp. 513-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovasz, L.3
-
10
-
-
84947747277
-
s
-
Advances in Cryptography, Proceedings of Indocrypt, Springer-Verlag, 2000
-
s" in Advances in Cryptography - Proceedings of Indocrypt 1998, Lecture Notes in Computer Science series, Springer-Verlag 1977, pp. 283-294, 2000.
-
(1977)
Lecture Notes in Computer Science series
, pp. 283-294
-
-
Lim, S.1
Kim, S.2
Yie, I.3
Lee, H.4
-
11
-
-
29144489773
-
New RSA Vulnerabilities using Lattics Reduction Methods
-
Ph.D. Dissertation. University of Paderborn
-
A. May "New RSA Vulnerabilities using Lattics Reduction Methods" Ph.D. Dissertation. University of Paderborn. 2003.
-
(2003)
-
-
May, A.1
-
13
-
-
50049117381
-
RSA and a higher degree diophantine equation
-
Submitted
-
A. Nitaj "RSA and a higher degree diophantine equation", Appl. Math. Comput., Submitted.
-
Appl. Math. Comput
-
-
Nitaj, A.1
-
14
-
-
50049135102
-
Application of ECM to a Class of RSA keys
-
submitted
-
A. Nitaj "Application of ECM to a Class of RSA keys", submitted.
-
-
-
Nitaj, A.1
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, L. Adleman "A method for obtaining digital signatures and public-key cryptosystems", Communication of ACM 21, pp. 120-126, 1978.
-
(1978)
Communication of ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
18
-
-
24144496203
-
-
R. Steinfeld, S. Contini, J. Pieprzyk, H. Wang Converse Results to the Wiener Attack on RSA Lecture Notes in Computer Science, Springer-Verlag 3386, pp. 184-198, 2005.
-
R. Steinfeld, S. Contini, J. Pieprzyk, H. Wang "Converse Results to the Wiener Attack on RSA" Lecture Notes in Computer Science, Springer-Verlag 3386, pp. 184-198, 2005.
-
-
-
-
19
-
-
84957625495
-
-
kq Advances in Cryptography - Proceedings of CRYPTO 1998, Lecture Notes in Computer Science series, Springer-Verlag 1462, pp. 318-326, 1998.
-
kq" Advances in Cryptography - Proceedings of CRYPTO 1998, Lecture Notes in Computer Science series, Springer-Verlag 1462, pp. 318-326, 1998.
-
-
-
-
21
-
-
0036542020
-
Cryptanalysis of RSA with small prime difference
-
B. de Weger "Cryptanalysis of RSA with small prime difference", Applicable Algebra in Engineering, Communication and Computing, Vol. 13(1), pp. 17-28, 2002.
-
(2002)
Applicable Algebra in Engineering, Communication and Computing
, vol.13
, Issue.1
, pp. 17-28
-
-
de Weger, B.1
-
22
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener "Cryptanalysis of short RSA secret exponents", IEEE Transactions on Information Theory, Vol. 36, pp. 553-558, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, pp. 553-558
-
-
Wiener, M.1
|