-
1
-
-
0000148836
-
Finding a small root of a bivariate integer equation
-
Springer-Verlag
-
D. Coppersmith. Finding a small root of a bivariate integer equation. Proc. Of Eurocrypt’96 Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, 1996
-
(1996)
Proc of Eurocrypt’96
, vol.1233
-
-
Coppersmith, D.1
-
2
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS)Vol. 46, No. 2, pp. 203-213, 1999.
-
(1999)
Notices of the American Mathematical Society (AMS)
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
3
-
-
0034226114
-
Durfee. Cryptanalysis of RSA with private key
-
July
-
D. Boneh and G. Durfee. Cryptanalysis of RSA with private key d less than N0.292. IEEE Transactions on Information Theory, Vol 46, No. 4, pp. 1339-1349, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1339-1349
-
-
Boneh, D.1
-
4
-
-
84947735905
-
An attack on RSA given a small fraction of the private key bits
-
Lecture Notes in Computer Science, Springer-Verlag
-
D. Boneh, G. Durfee and Y. Frankel. An attack on RSA given a small fraction of the private key bits. In proceedings AsiaCrypt’98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, pp. 25-34, 1998.
-
(1998)
Proceedings AsiaCrypt’98
, vol.1514
, pp. 25-34
-
-
Boneh, D.1
Durfee, G.2
Frankel, Y.3
-
5
-
-
84957045680
-
Factoring
-
Lecture Notes in Computer Science, Springer-Verlag
-
D. Boneh, G. Durfee and N. Howgrave-Graham. Factoring N = prq for large r. In Proceedings Crypto’99, Lecture Notes in Computer Science, Vol. 1666, Springer-Verlag, pp. 326-337, 1999.
-
(1999)
Proceedings Crypto’99
, vol.1666
, pp. 326-337
-
-
Boneh, D.1
Durfee, G.2
Howgrave-Graham, N.3
-
9
-
-
0041154689
-
NP-Complete decision problems for binary quadratics
-
K.L. Manders and L.M. Adleman. NP-Complete decision problems for binary quadratics. JCSSVol. 16(2), pp. 168-184, 1978.
-
(1978)
JCSS
, vol.16
, Issue.2
, pp. 168-184
-
-
Manders, K.L.1
Adleman, L.M.2
-
10
-
-
33846870481
-
Lattice reduction in cryptology: An update”
-
of LNCS. Springer-Verlag
-
P. Nguyen and J. Stern. Lattice reduction in cryptology: An update”, Algorithmic Number Theory – Proc. of ANTS-IV, volume 1838 of LNCS. Springer-Verlag, 2000.
-
(2000)
Algorithmic Number Theory – Proc of ANTS-IV
, vol.1838
-
-
Nguyen, P.1
Stern, J.2
-
11
-
-
0022722936
-
Fast public–key cryptosystem using congruent polynomial equations
-
T. Okamoto. Fast public–key cryptosystem using congruent polynomial equations Electronic letters, Vol. 22, No. 11, pp. 581-582, 1986.
-
(1986)
Electronic Letters
, vol.22
, Issue.11
, pp. 581-582
-
-
Okamoto, T.1
-
12
-
-
0023532388
-
A hierarchy of polynomial time lattice bases reduction algorithms
-
C–P. Schnorr. A hierarchy of polynomial time lattice bases reduction algorithms Theoretical computer science, Vol. 53, pp. 201-224, 1987.
-
(1987)
Theoretical Computer Science
, vol.53
, pp. 201-224
-
-
Schnorr, C.1
-
15
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener. Cryptanalysis of short RSA secret exponents IEEE Transactions of Information Theoryvolume 36, pages 553-558, 1990.
-
(1990)
IEEE Transactions of Information Theory
, vol.36
, pp. 553-558
-
-
Wiener, M.1
|