메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 369-381

New Attacks on PKCS#1 v1.5 Encryption

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84948949475     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_25     Document Type: Conference Paper
Times cited : (22)

References (15)
  • 1
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption
    • of Lecture Notes in Computer Science, Springer-Verlag
    • M. Bellare and P. Rogaway, Optimal Asymmetric Encryption, Advances in Cryptology - Eurocrypt ’94, vol. 950 of Lecture Notes in Computer Science, pp. 92-111, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - Eurocrypt ’94 , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
    • of Lecture Notes in Computer Science, Springer-Verlag
    • D. Bleichenbacher, Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1, Advances in Cryptology – CRYPTO ’98, vol. 1462 of Lecture Notes in Computer Science, pp. 1-12, Springer-Verlag, 1998.
    • (1998) Advances in Cryptology – CRYPTO ’98 , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 5
    • 84947924912 scopus 로고    scopus 로고
    • Finding a small root of a univariate modular equation
    • of Lecture Notes in Computer Science, Springer-Verlag
    • D. Coppersmith, Finding a small root of a univariate modular equation, Advances in Cryptology — EUROCRYPT ’96, vol. 1070 of Lecture Notes in Computer Science, pp. 155-165, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology — EUROCRYPT ’96 , vol.1070 , pp. 155-165
    • Coppersmith, D.1
  • 6
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • D. Coppersmith, Small solutions to polynomial equations, and low exponent RSA vulnerabilities, J. of CRYPTOLOGY, 10(4), pp. 233-260, 1997.
    • (1997) J. Of CRYPTOLOGY , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 8
    • 85030458019 scopus 로고
    • A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes, Advances in Cryptology — CRYPTO ’85, vol. 218 of Lecture Notes in Computer Science, pp. 516-522, Springer-Verlag, 1986.
    • (1986) Advances in Cryptology — CRYPTO ’85 , vol.218 , pp. 516-522
    • Desmedt, Y.1    Odlyzko, A.2
  • 9
    • 0002100612 scopus 로고
    • On the frequency of numbers containing prime factors of a certain relative magnitude
    • K. Dickman, On the frequency of numbers containing prime factors of a certain relative magnitude, Arkiv för matematik, astronomi och fysik, vol. 22A, no. 10, pp. 1-14, 1930.
    • (1930) Arkiv för Matematik, Astronomi Och Fysik , vol.22A , Issue.10 , pp. 1-14
    • Dickman, K.1
  • 11
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H. Lenstra, Factoring integers with elliptic curves, Annals of mathematics 126, 1987.
    • (1987) Annals of Mathematics , vol.126
    • Lenstra, H.1
  • 12
    • 84949041783 scopus 로고    scopus 로고
    • Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL), available at ftp://ftp.compapp.dcu.ie/pub/crypto/miracl.zip.
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21-2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21-2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.