메뉴 건너뛰기




Volumn 5350 LNCS, Issue , 2008, Pages 406-424

Solving linear equations modulo divisors: On factoring given any bits

Author keywords

Factoring with known bits; Lattices; Small roots

Indexed keywords

APPLICATIONS; CRYPTOGRAPHY; FACTORIZATION; POLYNOMIAL APPROXIMATION;

EID: 58349090134     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89255-7_25     Document Type: Conference Paper
Times cited : (71)

References (23)
  • 1
    • 0031644084 scopus 로고    scopus 로고
    • 2 is NP-hard for Randomized Reductions (Extended Abstract)
    • 2 is NP-hard for Randomized Reductions (Extended Abstract). In: STOC, pp. 10-19 (1998)
    • (1998) STOC , pp. 10-19
    • Ajtai, M.1
  • 3
    • 33745824539 scopus 로고    scopus 로고
    • New Attacks on RSA with Small Secret CRT-Exponents
    • Bleichenbacher, D., May, A.: New Attacks on RSA with Small Secret CRT-Exponents. In: Public Key Cryptography, pp. 1-13 (2006)
    • (2006) Public Key Cryptography , pp. 1-13
    • Bleichenbacher, D.1    May, A.2
  • 5
    • 33846874546 scopus 로고    scopus 로고
    • Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
    • Coron, J.-S., May, A.: Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. J. Cryptology 20(1), 39-50 (2007)
    • (2007) J. Cryptology , vol.20 , Issue.1 , pp. 39-50
    • Coron, J.-S.1    May, A.2
  • 6
    • 84947916423 scopus 로고    scopus 로고
    • Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Coppersmith, D.: Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 178-189. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 178-189
    • Coppersmith, D.1
  • 7
    • 84947924912 scopus 로고    scopus 로고
    • Finding a Small Root of a Univariate Modular Equation
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Coppersmith, D.: Finding a Small Root of a Univariate Modular Equation. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 155-165. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 155-165
    • Coppersmith, D.1
  • 8
    • 0001494997 scopus 로고    scopus 로고
    • Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
    • Coppersmith, D.: Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. Cryptology 10(4), 233-260 (1997)
    • (1997) J. Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 9
    • 38049102746 scopus 로고    scopus 로고
    • Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Coron, J.-S.: Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 379-394. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 379-394
    • Coron, J.-S.1
  • 10
    • 21744431523 scopus 로고    scopus 로고
    • Selective Forgery of RSA Signatures Using Redundancy
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Girault, M., Misarsky, J.-F.: Selective Forgery of RSA Signatures Using Redundancy. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 495-507. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 495-507
    • Girault, M.1    Misarsky, J.-F.2
  • 11
    • 84961378541 scopus 로고
    • Computation of approximate L-th roots modulo n and application to cryptography
    • Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
    • Girault, M., Toffin, P., Vallée, B.: Computation of approximate L-th roots modulo n and application to cryptography. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 100-117. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 100-117
    • Girault, M.1    Toffin, P.2    Vallée, B.3
  • 12
    • 0023985175 scopus 로고
    • Solving Simultaneous Modular Equations of Low Degree
    • Hastad, J.: Solving Simultaneous Modular Equations of Low Degree. SIAM Journal on Computing 17(2), 336-341 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 336-341
    • Hastad, J.1
  • 14
    • 84958958450 scopus 로고    scopus 로고
    • Howgrave-Graham, N.: Approximate Integer Common Divisors. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, 2146, pp. 51-66. Springer, Heidelberg (2001)
    • Howgrave-Graham, N.: Approximate Integer Common Divisors. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 51-66. Springer, Heidelberg (2001)
  • 15
    • 34250244723 scopus 로고
    • Factoring Polynomials with Ra tional Coefficients
    • Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring Polynomials with Ra tional Coefficients. Mathematische Annalen 261(4), 515-534 (1982)
    • (1982) Mathematische Annalen , vol.261 , Issue.4 , pp. 515-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovász, L.3
  • 16
    • 34249762539 scopus 로고
    • On the Oracle Complexity of Factoring Integers
    • Maurer, U.M.: On the Oracle Complexity of Factoring Integers. Computational Complexity 5(3/4), 237-247 (1995)
    • (1995) Computational Complexity , vol.5 , Issue.3-4 , pp. 237-247
    • Maurer, U.M.1
  • 17
    • 58349114804 scopus 로고    scopus 로고
    • May, A.: New RSA Vulnerabilities Using Lattice Reduction Methods. PhD thesis, University of Paderborn (2003)
    • May, A.: New RSA Vulnerabilities Using Lattice Reduction Methods. PhD thesis, University of Paderborn (2003)
  • 18
    • 35048868333 scopus 로고    scopus 로고
    • Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • May, A.: Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 213-219. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 213-219
    • May, A.1
  • 20
    • 35048881103 scopus 로고    scopus 로고
    • Nguyen, P.Q.: Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, 3027, pp. 555-570. Springer, Heidelberg (2004)
    • Nguyen, P.Q.: Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 555-570. Springer, Heidelberg (2004)
  • 21
    • 33846867921 scopus 로고    scopus 로고
    • Nguyen, P.Q., Stern, J.: The Two Faces of Lattices in Cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, 2146, pp. 146-180. Springer, Heidelberg (2001)
    • Nguyen, P.Q., Stern, J.: The Two Faces of Lattices in Cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 146-180. Springer, Heidelberg (2001)
  • 22
    • 24944584767 scopus 로고    scopus 로고
    • Floating-Point LLL Revisited
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Nguyen, P.Q., Stehlé, D.: Floating-Point LLL Revisited. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 215-233. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 215-233
    • Nguyen, P.Q.1    Stehlé, D.2
  • 23
    • 35248817671 scopus 로고
    • Efficient Factoring Based on Partial Information
    • Pichler, F, ed, EUROCRYPT 1985, Springer, Heidelberg
    • Rivest, R.L., Shamir, A.: Efficient Factoring Based on Partial Information. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 31-34. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.219 , pp. 31-34
    • Rivest, R.L.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.