-
2
-
-
0034226114
-
0.292
-
July
-
0.292," IEEE Trans. Inf. Theory, vol.46, no.4, pp.1339- 1349, July 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1339-1349
-
-
Boneh, D.1
Durfee, G.2
-
3
-
-
77956089601
-
Factorization of 512-bit RSA key using the number field sieve
-
S. Cavallar, B. Dodson, A.K. Lenstra, W. Lioen, P.L. Montgomery, B. Murphy, H. te Riele, K. Aardal, J. Gilchrist, G. Guillerm, P. Leyland, J. Marchand, F. Morain, A. Muffett, C. Putnam, C. Putnam, and P. Zimmermann, "Factorization of 512-bit RSA key using the number field sieve," Proc. Eurocrypt'00, LNCS 1807, pp.1-18, 2000.
-
(2000)
Proc. Eurocrypt'00, LNCS
, vol.1807
, pp. 1-18
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.K.3
Lioen, W.4
Montgomery, P.L.5
Murphy, B.6
Te Riele, H.7
Aardal, K.8
Gilchrist, J.9
Guillerm, G.10
Leyland, P.11
Marchand, J.12
Morain, F.13
Muffett, A.14
Putnam, C.15
Putnam, C.16
Zimmermann, P.17
-
4
-
-
84947916423
-
Finding a small root of a bivariate integer equation; Factoring with high bits known
-
D. Coppersmith, "Finding a small root of a bivariate integer equation; Factoring with high bits known," Proc. Eurocrypt'96, LNCS 1070, pp.178-189, 1996.
-
(1996)
Proc. Eurocrypt'96, LNCS
, vol.1070
, pp. 178-189
-
-
Coppersmith, D.1
-
5
-
-
35048854557
-
Simple backdoors for RSA key generation
-
Springer-Verlag
-
C. Crépeau and A. Slakmon, "Simple backdoors for RSA key generation," Topics in Cryptology-CT-RSA 2003, LNCS 2612, pp.403- 416, Springer-Verlag, 2003.
-
(2003)
Topics in Cryptology-CT-RSA 2003, LNCS
, vol.2612
, pp. 403-416
-
-
Crépeau, C.1
Slakmon, A.2
-
6
-
-
84937417845
-
Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt'99
-
G. Durfee and P. Nguyen, "Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt'99," Proc. Asiacrypt'00, LNCS 1976, pp.14-29, 2000.
-
(2000)
Proc. Asiacrypt'00, LNCS
, vol.1976
, pp. 14-29
-
-
Durfee, G.1
Nguyen, P.2
-
8
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Y. Frankel, "A practical protocol for large group oriented networks," Proc. Eurocrypt'89, LNCS 0434, pp.56-61, 1989.
-
(1989)
Proc. Eurocrypt'89, LNCS
, vol.434
, pp. 56-61
-
-
Frankel, Y.1
-
9
-
-
0037448163
-
The better bound of private key in RSA with unbalanced primes
-
H.S. Hong, H.K. Lee, H.S. Lee, and H.J. Lee, "The better bound of private key in RSA with unbalanced primes," Appl. Math. Comput., vol.139, pp.351-362, 2003.
-
(2003)
Appl. Math. Comput.
, vol.139
, pp. 351-362
-
-
Hong, H.S.1
Lee, H.K.2
Lee, H.S.3
Lee, H.J.4
-
10
-
-
26444467031
-
Tunable balancing of RSA. Information security and privacy
-
S.D. Galbraith, C. Heneghan, and J.F. McKee, "Tunable balancing of RSA. Information security and privacy," 10th Australasian Conference- ACISP 2005, LNCS 3574, pp.280-292, 2005.
-
(2005)
10th Australasian Conference-ACISP 2005, LNCS
, vol.3574
, pp. 280-292
-
-
Galbraith, S.D.1
Heneghan, C.2
McKee, J.F.3
-
11
-
-
85027188191
-
-
(Oct.). Available:
-
D. Alpern. (2003, Oct.). Available: http://www.alpertron.com.ar/ECM.HTM
-
(2003)
-
-
Alpern, D.1
-
12
-
-
0008662842
-
Security paradoxes: How improving a cryptosystem may weaken it
-
M. Joye, J.J. Quisquater, S.M. Yen, and M. Yung, "Security paradoxes: How improving a cryptosystem may weaken it," Proc. Ninth National Conference on Information Security, pp.27-32, 1999.
-
(1999)
Proc. Ninth National Conference on Information Security
, pp. 27-32
-
-
Joye, M.1
Quisquater, J.J.2
Yen, S.M.3
Yung, M.4
-
13
-
-
34250244723
-
Factoring polynomial with rational coefficients
-
A. Lenstra, H. Lenstra, and L. Lovasz, "Factoring polynomial with rational coefficients," Mathematiche Annalen, vol.261, pp.515-534, 1982.
-
(1982)
Mathematiche Annalen
, vol.261
, pp. 515-534
-
-
Lenstra, A.1
Lenstra, H.2
Lovasz, L.3
-
14
-
-
0001258323
-
Factoring integers with elliptic curves
-
H.W. Lenstra, Jr., "Factoring integers with elliptic curves," Annuals of Mathematics, vol.126, pp.649-673, 1987.
-
(1987)
Annuals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra Jr., H.W.1
-
16
-
-
0029371336
-
Extending the Wiener attack to RSA-type cryptosystems
-
R. Pinch, "Extending the Wiener attack to RSA-type cryptosystems," Electron. Lett., vol.31, pp.1736-1738, 1995.
-
(1995)
Electron. Lett.
, vol.31
, pp. 1736-1738
-
-
Pinch, R.1
-
17
-
-
84976113380
-
Theorems of factorization and primality testing
-
J. Pollard, "Theorems of factorization and primality testing," Proc. Cambridge Philos. Soc., pp.76:521-528, 1974.
-
(1974)
Proc. Cambridge Philos. Soc.
, vol.521-528
, pp. 76
-
-
Pollard, J.1
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, pp.120-126, 1987.
-
(1987)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
20
-
-
0028196052
-
New key generation algorithm for RSA cryptosystem
-
Jan.
-
R. Sakai, M. Morii, and M. Kasahara, "New key generation algorithm for RSA cryptosystem," IEICE Trans. Fundamentals, vol.E77- A, no.1, pp.89-97, Jan. 1994.
-
(1994)
IEICE Trans. Fundamentals
, vol.E77-A
, Issue.1
, pp. 89-97
-
-
Sakai, R.1
Morii, M.2
Kasahara, M.3
-
21
-
-
84956867073
-
On the design of RSA with short secret exponent
-
H.M. Sun, W.C. Yang, and C.S. Laih, "On the design of RSA with short secret exponent," Proc. Asiacrypt'99, LNCS 1716, pp.150- 164, 1999.
-
(1999)
Proc. Asiacrypt'99, LNCS
, vol.1716
, pp. 150-164
-
-
Sun, H.M.1
Yang, W.C.2
Laih, C.S.3
-
22
-
-
66249100708
-
Design of rebalanced RSA-CRT for fast encryption
-
H.M. Sun and M.E. Wu, "Design of rebalanced RSA-CRT for fast encryption," Information Security Conference 2005, pp.16-27, 2005.
-
(2005)
Information Security Conference
, vol.2005
, pp. 16-27
-
-
Sun, H.M.1
Wu, M.E.2
-
24
-
-
0030662908
-
Cryptanalysis of less short RSA secret exponents
-
E. Verheul and H. van Tilborg, "Cryptanalysis of less short RSA secret exponents," Applicable Algebra in Engineering, Communication and Computing, vol.8, pp.425-435, 1997.
-
(1997)
Applicable Algebra in Engineering, Communication and Computing
, vol.8
, pp. 425-435
-
-
Verheul, E.1
Van Tilborg, H.2
-
25
-
-
0036542020
-
Cryptanalysis of RSA with small prime difference
-
B. de Weger, "Cryptanalysis of RSA with small prime difference," Applicable Algebra in Engineering, Communication and Computing, vol.13, pp.17-28, 2002.
-
(2002)
Applicable Algebra in Engineering, Communication and Computing
, vol.13
, pp. 17-28
-
-
De Weger, B.1
-
26
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener, "Cryptanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, vol.36, no.3, pp.553-558, 1990.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.1
-
27
-
-
84955586344
-
The dark side of "black-box" cryptography, or: Should we trust capstone?
-
A. Young and M. Yung, "The dark side of "black-box" cryptography, or: Should we trust capstone?," Advances in Cryptology- CRYPTO'96, LNCS 1109, pp.89-103, 1996.
-
(1996)
Advances in Cryptology-CRYPTO'96, LNCS
, vol.1109
, pp. 89-103
-
-
Young, A.1
Yung, M.2
|