Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound (Q1727391): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
Created claim: Wikidata QID (P12): Q129331854, #quickstatements; #temporary_batch_1728349196749
 
(2 intermediate revisions by 2 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.tcs.2018.08.021 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2889437918 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of short RSA secret exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of RSA with private key d less than N/sup 0.292/ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding a Small Root of a Univariate Modular Equation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249286 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attacks on RSA up to Full Size Exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Lattice Construction for Partial Key Exposure Attack for RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Factoring polynomials with rational coefficients / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith’s Technique and Applications to RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707398 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small secret exponent attack on RSA variant with modulus \(N=p^rq\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting prime power RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of RSA with Multiple Small Secret Exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generalize RSA Cryptanalyses / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Tool Kit for Partial Key Exposure Attacks on RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Solving Linear Equations Modulo Unknown Divisors: Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small Secret Key Attack on a Variant of RSA (Due to Takagi) / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of multi-prime RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the optimality of lattices for the Coppersmith technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small CRT-Exponent RSA Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2--5, 2009. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small solutions to polynomial equations, and low exponent RSA vulnerabilities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4787196 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using LLL-Reduction for Solving RSA and Factorization Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4787205 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4400575 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q129331854 / rank
 
Normal rank

Latest revision as of 03:20, 8 October 2024

scientific article
Language Label Description Also known as
English
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound
scientific article

    Statements

    Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound (English)
    0 references
    0 references
    0 references
    20 February 2019
    0 references
    RSA
    0 references
    partial key exposure
    0 references
    lattices
    0 references
    Coppersmith's method
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers