메뉴 건너뛰기




Volumn E92-A, Issue 3, 2009, Pages 912-918

Short-exponent RSA

Author keywords

Digital signature; Encryption; Public key cryptosystem; RSA

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; POLYNOMIALS; PUBLIC KEY CRYPTOGRAPHY;

EID: 77956073401     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E92.A.912     Document Type: Article
Times cited : (4)

References (27)
  • 4
    • 84947916423 scopus 로고    scopus 로고
    • Finding a small root of a bivariate integer equation; Factoring with high bits known
    • D. Coppersmith, "Finding a small root of a bivariate integer equation; Factoring with high bits known," Proc. Eurocrypt'96, LNCS 1070, pp.178-189, 1996.
    • (1996) Proc. Eurocrypt'96, LNCS , vol.1070 , pp. 178-189
    • Coppersmith, D.1
  • 5
    • 35048854557 scopus 로고    scopus 로고
    • Simple backdoors for RSA key generation
    • Springer-Verlag
    • C. Crépeau and A. Slakmon, "Simple backdoors for RSA key generation," Topics in Cryptology-CT-RSA 2003, LNCS 2612, pp.403- 416, Springer-Verlag, 2003.
    • (2003) Topics in Cryptology-CT-RSA 2003, LNCS , vol.2612 , pp. 403-416
    • Crépeau, C.1    Slakmon, A.2
  • 6
    • 84937417845 scopus 로고    scopus 로고
    • Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt'99
    • G. Durfee and P. Nguyen, "Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt'99," Proc. Asiacrypt'00, LNCS 1976, pp.14-29, 2000.
    • (2000) Proc. Asiacrypt'00, LNCS , vol.1976 , pp. 14-29
    • Durfee, G.1    Nguyen, P.2
  • 8
    • 0039241746 scopus 로고
    • A practical protocol for large group oriented networks
    • Y. Frankel, "A practical protocol for large group oriented networks," Proc. Eurocrypt'89, LNCS 0434, pp.56-61, 1989.
    • (1989) Proc. Eurocrypt'89, LNCS , vol.434 , pp. 56-61
    • Frankel, Y.1
  • 9
    • 0037448163 scopus 로고    scopus 로고
    • The better bound of private key in RSA with unbalanced primes
    • H.S. Hong, H.K. Lee, H.S. Lee, and H.J. Lee, "The better bound of private key in RSA with unbalanced primes," Appl. Math. Comput., vol.139, pp.351-362, 2003.
    • (2003) Appl. Math. Comput. , vol.139 , pp. 351-362
    • Hong, H.S.1    Lee, H.K.2    Lee, H.S.3    Lee, H.J.4
  • 11
    • 85027188191 scopus 로고    scopus 로고
    • (Oct.). Available:
    • D. Alpern. (2003, Oct.). Available: http://www.alpertron.com.ar/ECM.HTM
    • (2003)
    • Alpern, D.1
  • 13
    • 34250244723 scopus 로고
    • Factoring polynomial with rational coefficients
    • A. Lenstra, H. Lenstra, and L. Lovasz, "Factoring polynomial with rational coefficients," Mathematiche Annalen, vol.261, pp.515-534, 1982.
    • (1982) Mathematiche Annalen , vol.261 , pp. 515-534
    • Lenstra, A.1    Lenstra, H.2    Lovasz, L.3
  • 14
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H.W. Lenstra, Jr., "Factoring integers with elliptic curves," Annuals of Mathematics, vol.126, pp.649-673, 1987.
    • (1987) Annuals of Mathematics , vol.126 , pp. 649-673
    • Lenstra Jr., H.W.1
  • 16
    • 0029371336 scopus 로고
    • Extending the Wiener attack to RSA-type cryptosystems
    • R. Pinch, "Extending the Wiener attack to RSA-type cryptosystems," Electron. Lett., vol.31, pp.1736-1738, 1995.
    • (1995) Electron. Lett. , vol.31 , pp. 1736-1738
    • Pinch, R.1
  • 17
    • 84976113380 scopus 로고
    • Theorems of factorization and primality testing
    • J. Pollard, "Theorems of factorization and primality testing," Proc. Cambridge Philos. Soc., pp.76:521-528, 1974.
    • (1974) Proc. Cambridge Philos. Soc. , vol.521-528 , pp. 76
    • Pollard, J.1
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, pp.120-126, 1987.
    • (1987) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 20
    • 0028196052 scopus 로고
    • New key generation algorithm for RSA cryptosystem
    • Jan.
    • R. Sakai, M. Morii, and M. Kasahara, "New key generation algorithm for RSA cryptosystem," IEICE Trans. Fundamentals, vol.E77- A, no.1, pp.89-97, Jan. 1994.
    • (1994) IEICE Trans. Fundamentals , vol.E77-A , Issue.1 , pp. 89-97
    • Sakai, R.1    Morii, M.2    Kasahara, M.3
  • 21
    • 84956867073 scopus 로고    scopus 로고
    • On the design of RSA with short secret exponent
    • H.M. Sun, W.C. Yang, and C.S. Laih, "On the design of RSA with short secret exponent," Proc. Asiacrypt'99, LNCS 1716, pp.150- 164, 1999.
    • (1999) Proc. Asiacrypt'99, LNCS , vol.1716 , pp. 150-164
    • Sun, H.M.1    Yang, W.C.2    Laih, C.S.3
  • 22
    • 66249100708 scopus 로고    scopus 로고
    • Design of rebalanced RSA-CRT for fast encryption
    • H.M. Sun and M.E. Wu, "Design of rebalanced RSA-CRT for fast encryption," Information Security Conference 2005, pp.16-27, 2005.
    • (2005) Information Security Conference , vol.2005 , pp. 16-27
    • Sun, H.M.1    Wu, M.E.2
  • 26
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M. Wiener, "Cryptanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, vol.36, no.3, pp.553-558, 1990.
    • (1990) IEEE Trans. Inf. Theory , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.1
  • 27
    • 84955586344 scopus 로고    scopus 로고
    • The dark side of "black-box" cryptography, or: Should we trust capstone?
    • A. Young and M. Yung, "The dark side of "black-box" cryptography, or: Should we trust capstone?," Advances in Cryptology- CRYPTO'96, LNCS 1109, pp.89-103, 1996.
    • (1996) Advances in Cryptology-CRYPTO'96, LNCS , vol.1109 , pp. 89-103
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.