Finding a Small Root of a Univariate Modular Equation

From MaRDI portal
Revision as of 19:29, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2876895

DOI10.1007/3-540-68339-9_14zbMath1304.94042OpenAlexW1749471906MaRDI QIDQ2876895

Don Coppersmith

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_14




Related Items (50)

A Unified Framework for Small Secret Exponent Attack on RSAToward RSA-OAEP Without Random OraclesCryptanalysis of Prime Power RSA with two private exponentsAn efficient probabilistic public-key cryptosystem over quadratic fields quotientsRemarks on the cryptanalysis of common prime RSA for IoT constrained low power devicesInferring sequences produced by elliptic curve generators using Coppersmith's methodsCloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector ProblemA New Partial Key Exposure Attack on Multi-power RSAPractical attacks on small private exponent RSA: new records and new insightsInferring sequences produced by the quadratic generatorImproving bounds on elliptic curve hidden number problem for ECDH key exchangeInstantiability of classical random-oracle-model encryption transformsA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingLattice attacks against elliptic-curve signatures with blinded scalar multiplicationExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsAn improved method for predicting truncated multiple recursive generators with unknown parametersA Tool Kit for Partial Key Exposure Attacks on RSAPartial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier PolynomialOn the security of multi-prime RSAThrackles: An Improved Upper BoundFurther improvement of factoring \(N=p^rq^s\) with partial known bitsPrivately outsourcing exponentiation to a single server: cryptanalysis and optimal constructionsPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundImplicit Related-Key Factorization Problem on the RSA CryptosystemApplications of SigncryptionCryptanalysis of the RSA variant based on cubic Pell equationOn the optimality of lattices for the Coppersmith techniqueOptimal security proofs for full domain hash. RevisitedThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionCombined Attack on CRT-RSASmall CRT-Exponent RSA RevisitedSmall CRT-exponent RSA revisitedA method for obtaining digital signatures and public-key cryptosystemsUsing LLL-Reduction for Solving RSA and Factorization ProblemsThe Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise AppearanceSolving Linear Equations Modulo Divisors: On Factoring Given Any BitsFinding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystemPartial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsLattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasuresCryptanalysis of elliptic curve hidden number problem from PKC 2017RSA Moduli with a Predetermined Portion: Techniques and ApplicationsPartial Key Exposure Attacks on RSA with Multiple Exponent PairsInferring Sequences Produced by a Linear Congruential Generator on Elliptic Curves Using Coppersmith’s MethodsSimplified High-Speed High-Distance List Decoding for Alternant CodesComputing prime divisors in an intervalGeneralized cryptanalysis of small CRT-exponent RSAA small secret exponent attack on cryptosystems using Dickson polynomialsA new parallel lattice reduction algorithm for BKZ reduced basesFormally verified certificate checkers for hardest-to-round computationForty years of attacks on the RSA cryptosystem: A brief survey






This page was built for publication: Finding a Small Root of a Univariate Modular Equation