메뉴 건너뛰기




Volumn 5222 LNCS, Issue , 2008, Pages 228-243

Revisiting wiener's attack - New weak keys in RSA

Author keywords

Cryptanalysis; Factorization; RSA; Weak Keys

Indexed keywords

CONTROL THEORY; KEYS (FOR LOCKS); SECURITY OF DATA;

EID: 56649102112     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85886-7_16     Document Type: Conference Paper
Times cited : (32)

References (20)
  • 1
    • 35048880963 scopus 로고    scopus 로고
    • Blömer, J., May, A.: A generalized Wiener attack on RSA. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 1-13. Springer, Heidelberg (2004)
    • Blömer, J., May, A.: A generalized Wiener attack on RSA. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 1-13. Springer, Heidelberg (2004)
  • 2
    • 0000552770 scopus 로고    scopus 로고
    • Twenty Years of Attacks on the RSA Cryptosystem
    • Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem. Notices of the AMS 46(2), 203-213 (1999)
    • (1999) Notices of the AMS , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 4
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations and low exponent vulnerabilities
    • Copppersmith, D.: Small solutions to polynomial equations and low exponent vulnerabilities. Journal of Cryptology 10(4), 223-260 (1997)
    • (1997) Journal of Cryptology , vol.10 , Issue.4 , pp. 223-260
    • Copppersmith, D.1
  • 5
    • 33846874546 scopus 로고    scopus 로고
    • Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
    • Coron, J.-S., May, A.: Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring, J. Cryptology 20(1), 39-50 (2007)
    • (2007) J. Cryptology , vol.20 , Issue.1 , pp. 39-50
    • Coron, J.-S.1    May, A.2
  • 6
    • 24144480649 scopus 로고    scopus 로고
    • Continued fractions and RSA with small secret exponent
    • Duejella, A.: Continued fractions and RSA with small secret exponent. Tatra Mt. Math. Publ. 29, 101-112 (2004)
    • (2004) Tatra Mt. Math. Publ , vol.29 , pp. 101-112
    • Duejella, A.1
  • 8
    • 85034631664 scopus 로고
    • On using RSA with low exponent in public key network
    • Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
    • Hastad, J.: On using RSA with low exponent in public key network. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 403-408. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 403-408
    • Hastad, J.1
  • 10
    • 38049163806 scopus 로고    scopus 로고
    • 0.073
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • 0.073. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 395-411. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 395-411
    • Jochemsz, E.1    May, A.2
  • 11
    • 84976113380 scopus 로고
    • Theorems on factorization and primality testing
    • Pollard, J.M.: Theorems on factorization and primality testing. Proc. of Combridge Philos. Soc. 76, 521-528 (1974)
    • (1974) Proc. of Combridge Philos. Soc , vol.76 , pp. 521-528
    • Pollard, J.M.1
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of ACM 21(2), 158-164 (1978)
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 158-164
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 14
    • 0002512297 scopus 로고    scopus 로고
    • Fast generation of random, strong RSA primes
    • Silverman, R.D.: Fast generation of random, strong RSA primes. Cryptobytes 3(1), 9-13 (1997)
    • (1997) Cryptobytes , vol.3 , Issue.1 , pp. 9-13
    • Silverman, R.D.1
  • 16
    • 24144496203 scopus 로고    scopus 로고
    • Steinfeld, R., Contini, S., Pieprzyk, J., Wang, H.: Converse results to the Wiener attack on RSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 184-198. Springer, Heidelberg (2005)
    • Steinfeld, R., Contini, S., Pieprzyk, J., Wang, H.: Converse results to the Wiener attack on RSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 184-198. Springer, Heidelberg (2005)
  • 18
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory 36(3), 553-558 (1990)
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.1
  • 19
    • 84966201687 scopus 로고
    • A p+1 method of factoring
    • Williams, H.C.: A p+1 method of factoring. Mathematics of Computation 39(159), 225-234 (1982)
    • (1982) Mathematics of Computation , vol.39 , Issue.159 , pp. 225-234
    • Williams, H.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.