-
1
-
-
35048880963
-
-
Blömer, J., May, A.: A generalized Wiener attack on RSA. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 1-13. Springer, Heidelberg (2004)
-
Blömer, J., May, A.: A generalized Wiener attack on RSA. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 1-13. Springer, Heidelberg (2004)
-
-
-
-
2
-
-
0000552770
-
Twenty Years of Attacks on the RSA Cryptosystem
-
Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem. Notices of the AMS 46(2), 203-213 (1999)
-
(1999)
Notices of the AMS
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
4
-
-
0001494997
-
Small solutions to polynomial equations and low exponent vulnerabilities
-
Copppersmith, D.: Small solutions to polynomial equations and low exponent vulnerabilities. Journal of Cryptology 10(4), 223-260 (1997)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 223-260
-
-
Copppersmith, D.1
-
5
-
-
33846874546
-
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
-
Coron, J.-S., May, A.: Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring, J. Cryptology 20(1), 39-50 (2007)
-
(2007)
J. Cryptology
, vol.20
, Issue.1
, pp. 39-50
-
-
Coron, J.-S.1
May, A.2
-
6
-
-
24144480649
-
Continued fractions and RSA with small secret exponent
-
Duejella, A.: Continued fractions and RSA with small secret exponent. Tatra Mt. Math. Publ. 29, 101-112 (2004)
-
(2004)
Tatra Mt. Math. Publ
, vol.29
, pp. 101-112
-
-
Duejella, A.1
-
8
-
-
85034631664
-
On using RSA with low exponent in public key network
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Hastad, J.: On using RSA with low exponent in public key network. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 403-408. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 403-408
-
-
Hastad, J.1
-
9
-
-
50049087279
-
A new RSA vulnerability using continued fractions
-
Doha, Qatar, March 31-April 4
-
Ibrahim, D., Bahig, H.M., Bhery, A., Daoud, S.S.: A new RSA vulnerability using continued fractions. In: 6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2008), Doha, Qatar, March 31-April 4 (2008)
-
(2008)
6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA
-
-
Ibrahim, D.1
Bahig, H.M.2
Bhery, A.3
Daoud, S.S.4
-
10
-
-
38049163806
-
0.073
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
0.073. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 395-411. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 395-411
-
-
Jochemsz, E.1
May, A.2
-
11
-
-
84976113380
-
Theorems on factorization and primality testing
-
Pollard, J.M.: Theorems on factorization and primality testing. Proc. of Combridge Philos. Soc. 76, 521-528 (1974)
-
(1974)
Proc. of Combridge Philos. Soc
, vol.76
, pp. 521-528
-
-
Pollard, J.M.1
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of ACM 21(2), 158-164 (1978)
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 158-164
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
0002512297
-
Fast generation of random, strong RSA primes
-
Silverman, R.D.: Fast generation of random, strong RSA primes. Cryptobytes 3(1), 9-13 (1997)
-
(1997)
Cryptobytes
, vol.3
, Issue.1
, pp. 9-13
-
-
Silverman, R.D.1
-
16
-
-
24144496203
-
-
Steinfeld, R., Contini, S., Pieprzyk, J., Wang, H.: Converse results to the Wiener attack on RSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 184-198. Springer, Heidelberg (2005)
-
Steinfeld, R., Contini, S., Pieprzyk, J., Wang, H.: Converse results to the Wiener attack on RSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 184-198. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
0030662908
-
Cryptanalysis of 'less short' RSA secret exponents
-
Verheul, E.R., van Tilborg, H.C.A.: Cryptanalysis of 'less short' RSA secret exponents. Applicable Algebra in Engineering, Communication and Computing 8, 425-435 (1997)
-
(1997)
Applicable Algebra in Engineering, Communication and Computing
, vol.8
, pp. 425-435
-
-
Verheul, E.R.1
van Tilborg, H.C.A.2
-
18
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory 36(3), 553-558 (1990)
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.1
-
19
-
-
84966201687
-
A p+1 method of factoring
-
Williams, H.C.: A p+1 method of factoring. Mathematics of Computation 39(159), 225-234 (1982)
-
(1982)
Mathematics of Computation
, vol.39
, Issue.159
, pp. 225-234
-
-
Williams, H.C.1
|