-
1
-
-
0031232428
-
The Magma algebra system I: The user language
-
Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system I: The user language. J. Symbolic Comput. 24(3-4), 235-265 (1997); Computational algebra and number theory, London (1993) (Pubitemid 127167874)
-
(1997)
Journal of Symbolic Computation
, vol.24
, Issue.3-4
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.2
Playoust, C.3
-
2
-
-
84947916423
-
Finding a small root of a bivariate integer equation; factoring with high bits known
-
Coppersmith, D.: Finding a small root of a bivariate integer equation; factoring with high bits known. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 178-189. Springer, Heidelberg (1996) (Pubitemid 126071064)
-
(1996)
Lecture Notes in Computer Science
, Issue.1070
, pp. 178-189
-
-
Coppersmith, D.1
-
3
-
-
44449128937
-
Predicting lattice reduction
-
DOI 10.1007/978-3-540-78967-3-3, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 31-51. Springer, Heidelberg (2008) (Pubitemid 351762822)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 31-51
-
-
Gama, N.1
Nguyen, P.Q.2
-
4
-
-
38049105289
-
Improved analysis of Kannan's shortest lattice vector algorithm
-
Menezes, A. (ed.). Springer, Heidelberg
-
Hanrot, G., Stehlé, D.: Improved analysis of Kannan's shortest lattice vector algorithm. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 170-186. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007. LNCS
, vol.4622
, pp. 170-186
-
-
Hanrot, G.1
Stehlé, D.2
-
5
-
-
34547923465
-
A strategy for finding roots of multivariate polynomials with new applications in attacking rsa variants
-
Lai, X., Chen, K. (eds.). Springer, Heidelberg
-
Jochemsz, E., May, A.: A strategy for finding roots of multivariate polynomials with new applications in attacking rsa variants. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 267-282. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006. LNCS
, vol.4284
, pp. 267-282
-
-
Jochemsz, E.1
May, A.2
-
9
-
-
67049119182
-
Implicit factoring: On polynomial time factoring given only an implicit hint
-
Jarecki, S., Tsudik, G. (eds.). Springer, Heidelberg
-
May, A., Ritzenhofen,M.: Implicit factoring: On polynomial time factoring given only an implicit hint. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 1-14. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 1-14
-
-
May, A.1
Ritzenhofen, M.2
-
11
-
-
84966219731
-
A method of factoring and the factorization of F7
-
Morrison, M.A., Brillhart, J.: A method of factoring and the factorization of F7.Mathematics of Computation 29(129), 183-205 (1975)
-
(1975)
Mathematics of Computation
, vol.29
, Issue.129
, pp. 183-205
-
-
Morrison, M.A.1
Brillhart, J.2
-
12
-
-
24944584767
-
Floating-point LLL revisited
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Nguyen, P.Q., Stehlé, D.: Floating-point lll revisited. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 215-233. Springer, Heidelberg (2005) (Pubitemid 41313955)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 215-233
-
-
Nguyen, P.Q.1
Stehle, D.2
-
13
-
-
58349108198
-
Rigorous and efficient short lattice vectors enumeration
-
Pieprzyk, J. (ed.). Springer, Heidelberg
-
Pujol, X., Stehlé, D.: Rigorous and efficient short lattice vectors enumeration. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 390-405. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008. LNCS
, vol.5350
, pp. 390-405
-
-
Pujol, X.1
Stehlé, D.2
-
14
-
-
35248817671
-
Efficient factoring based on partial information
-
Pichler, F. (ed.). Springer, Heidelberg
-
Rivest, R.L., Shamir, A.: Efficient factoring based on partial information. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 31-34. Springer, Heidelberg (1986)
-
(1986)
EUROCRYPT 1985. LNCS
, vol.219
, pp. 31-34
-
-
Rivest, R.L.1
Shamir, A.2
-
15
-
-
69249083297
-
Further results on implicit factoring in polynomial time
-
Sarkar, S., Maitra, S.: Further Results on Implicit Factoring in Polynomial Time. Advances in Mathematics of Communications 3(2), 205-217 (2009)
-
(2009)
Advances in Mathematics of Communications
, vol.3
, Issue.2
, pp. 205-217
-
-
Sarkar, S.1
Maitra, S.2
-
16
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
IEEE, Los Alamitos
-
Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: FOCS, pp. 124-134. IEEE, Los Alamitos (1994)
-
(1994)
FOCS
, pp. 124-134
-
-
Shor, P.W.1
-
17
-
-
0029272081
-
Short rsa keys and their generation
-
Vanstone, S.A., Zuccherato, R.J.: Short rsa keys and their generation. J. Cryptology 8(2), 101-114 (1995)
-
(1995)
J. Cryptology
, vol.8
, Issue.2
, pp. 101-114
-
-
Vanstone, S.A.1
Zuccherato, R.J.2
|