A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants

From MaRDI portal
Revision as of 10:53, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5459084

DOI10.1007/11935230_18zbMath1172.94577OpenAlexW1961022628MaRDI QIDQ5459084

Ellen Jochemsz, Alexander May

Publication date: 24 April 2008

Published in: Advances in Cryptology – ASIACRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11935230_18






Related Items (50)

Attacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationClassical attacks on a variant of the RSA cryptosystemAttacks on pseudo random number generators hiding a linear structureRecovering zeros of polynomials modulo a primeApproximate divisor multiples -- factoring with only a third of the secret CRT-exponentsRemarks on the cryptanalysis of common prime RSA for IoT constrained low power devicesFast rebalanced RSA signature scheme with typical prime generationInferring sequences produced by elliptic curve generators using Coppersmith's methodsCryptanalytic results on `Dual CRT' and `Common Prime' RSAReconstructing points of superelliptic curves over a prime finite fieldFinding points on elliptic curves with Coppersmith's methodFurther cryptanalysis of a type of RSA variantsOn the Security of Supersingular Isogeny CryptosystemsCryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate PolynomialsInferring sequences produced by the quadratic generatorImproving bounds on elliptic curve hidden number problem for ECDH key exchangeExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsA Tool Kit for Partial Key Exposure Attacks on RSAAn Improved Analysis on Three Variants of the RSA CryptosystemOn the security of multi-prime RSAImproved Results on Cryptanalysis of Prime Power RSAA generalized attack on some variants of the RSA cryptosystemPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundCryptanalysis of the RSA variant based on cubic Pell equationOn the optimality of lattices for the Coppersmith techniqueThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionCryptanalysis of Dual RSACombined Attack on CRT-RSACoppersmith's lattices and ``focus groups: an attack on small-exponent RSAA new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSASmall CRT-Exponent RSA RevisitedSmall CRT-exponent RSA revisitedUnnamed ItemUsing LLL-Reduction for Solving RSA and Factorization ProblemsNew Results of Breaking the CLS Scheme from ACM-CCS 2014Partial prime factor exposure attacks on some RSA variantsCryptanalysis of RSA with two decryption exponentsCryptanalysis of RSA with more than one decryption exponentPartial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsImplicit-key attack on the RSA cryptosystemSolving modular cubic equations with Coppersmith's methodFinding small roots for bivariate polynomials over the ring of integersRevisiting RSA-polynomial problem and semiprime factorizationCryptanalysis of elliptic curve hidden number problem from PKC 2017Solving the hidden number problem for CSIDH and CSURF via automated CoppersmithOn the possibility of a backdoor in the Micali-Schnorr generatorInferring Sequences Produced by a Linear Congruential Generator on Elliptic Curves Using Coppersmith’s MethodsPartial Key Exposure: Generalized Framework to Attack RSAA Unified Method for Private Exponent Attacks on RSA Using LatticesForty years of attacks on the RSA cryptosystem: A brief survey


Uses Software






This page was built for publication: A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants