-
1
-
-
0031644084
-
2 is NP-hard for Randomized Reductions (Extended Abstract)
-
2 is NP-hard for Randomized Reductions (Extended Abstract). In: STOC, pp. 10-19 (1998)
-
(1998)
STOC
, pp. 10-19
-
-
Ajtai, M.1
-
3
-
-
33745824539
-
New Attacks on RSA with Small Secret CRT-Exponents
-
Bleichenbacher, D., May, A.: New Attacks on RSA with Small Secret CRT-Exponents. In: Public Key Cryptography, pp. 1-13 (2006)
-
(2006)
Public Key Cryptography
, pp. 1-13
-
-
Bleichenbacher, D.1
May, A.2
-
4
-
-
0000951613
-
Improved Low-Density Subset Sum Algorithms
-
Coster, M.J., Joux, A., LaMacchia, B.A., Odlyzko, A.M., Schnorr, C.-P., Stern, J.: Improved Low-Density Subset Sum Algorithms. Computational Complexity 2, 111-128 (1992)
-
(1992)
Computational Complexity
, vol.2
, pp. 111-128
-
-
Coster, M.J.1
Joux, A.2
LaMacchia, B.A.3
Odlyzko, A.M.4
Schnorr, C.-P.5
Stern, J.6
-
5
-
-
33846874546
-
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
-
Coron, J.-S., May, A.: Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. J. Cryptology 20(1), 39-50 (2007)
-
(2007)
J. Cryptology
, vol.20
, Issue.1
, pp. 39-50
-
-
Coron, J.-S.1
May, A.2
-
6
-
-
84947916423
-
Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Coppersmith, D.: Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 178-189. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 178-189
-
-
Coppersmith, D.1
-
7
-
-
84947924912
-
Finding a Small Root of a Univariate Modular Equation
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Coppersmith, D.: Finding a Small Root of a Univariate Modular Equation. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 155-165. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 155-165
-
-
Coppersmith, D.1
-
8
-
-
0001494997
-
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
-
Coppersmith, D.: Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. Cryptology 10(4), 233-260 (1997)
-
(1997)
J. Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
9
-
-
38049102746
-
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Coron, J.-S.: Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 379-394. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 379-394
-
-
Coron, J.-S.1
-
10
-
-
21744431523
-
Selective Forgery of RSA Signatures Using Redundancy
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Girault, M., Misarsky, J.-F.: Selective Forgery of RSA Signatures Using Redundancy. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 495-507. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 495-507
-
-
Girault, M.1
Misarsky, J.-F.2
-
11
-
-
84961378541
-
Computation of approximate L-th roots modulo n and application to cryptography
-
Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
-
Girault, M., Toffin, P., Vallée, B.: Computation of approximate L-th roots modulo n and application to cryptography. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 100-117. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 100-117
-
-
Girault, M.1
Toffin, P.2
Vallée, B.3
-
12
-
-
0023985175
-
Solving Simultaneous Modular Equations of Low Degree
-
Hastad, J.: Solving Simultaneous Modular Equations of Low Degree. SIAM Journal on Computing 17(2), 336-341 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 336-341
-
-
Hastad, J.1
-
14
-
-
84958958450
-
-
Howgrave-Graham, N.: Approximate Integer Common Divisors. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, 2146, pp. 51-66. Springer, Heidelberg (2001)
-
Howgrave-Graham, N.: Approximate Integer Common Divisors. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 51-66. Springer, Heidelberg (2001)
-
-
-
-
15
-
-
34250244723
-
Factoring Polynomials with Ra tional Coefficients
-
Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring Polynomials with Ra tional Coefficients. Mathematische Annalen 261(4), 515-534 (1982)
-
(1982)
Mathematische Annalen
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
16
-
-
34249762539
-
On the Oracle Complexity of Factoring Integers
-
Maurer, U.M.: On the Oracle Complexity of Factoring Integers. Computational Complexity 5(3/4), 237-247 (1995)
-
(1995)
Computational Complexity
, vol.5
, Issue.3-4
, pp. 237-247
-
-
Maurer, U.M.1
-
17
-
-
58349114804
-
-
May, A.: New RSA Vulnerabilities Using Lattice Reduction Methods. PhD thesis, University of Paderborn (2003)
-
May, A.: New RSA Vulnerabilities Using Lattice Reduction Methods. PhD thesis, University of Paderborn (2003)
-
-
-
-
18
-
-
35048868333
-
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
May, A.: Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 213-219. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 213-219
-
-
May, A.1
-
20
-
-
35048881103
-
-
Nguyen, P.Q.: Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, 3027, pp. 555-570. Springer, Heidelberg (2004)
-
Nguyen, P.Q.: Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 555-570. Springer, Heidelberg (2004)
-
-
-
-
21
-
-
33846867921
-
-
Nguyen, P.Q., Stern, J.: The Two Faces of Lattices in Cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, 2146, pp. 146-180. Springer, Heidelberg (2001)
-
Nguyen, P.Q., Stern, J.: The Two Faces of Lattices in Cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 146-180. Springer, Heidelberg (2001)
-
-
-
-
22
-
-
24944584767
-
Floating-Point LLL Revisited
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Nguyen, P.Q., Stehlé, D.: Floating-Point LLL Revisited. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 215-233. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 215-233
-
-
Nguyen, P.Q.1
Stehlé, D.2
-
23
-
-
35248817671
-
Efficient Factoring Based on Partial Information
-
Pichler, F, ed, EUROCRYPT 1985, Springer, Heidelberg
-
Rivest, R.L., Shamir, A.: Efficient Factoring Based on Partial Information. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 31-34. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.219
, pp. 31-34
-
-
Rivest, R.L.1
Shamir, A.2
|