scientific article; zbMATH DE number 1302856
From MaRDI portal
Publication:4249341
Recommendations
Cited in
(39)- Fast square-free decomposition of integers using class groups
- An Adaptation of the NICE Cryptosystem to Real Quadratic Orders
- Comment on ``An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)
- Cryptanalysis of Prime Power RSA with two private exponents
- Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices
- Improved cryptanalysis of the multi-power RSA cryptosystem variant
- A generalized attack on RSA type cryptosystems
- scientific article; zbMATH DE number 16481 (Why is no real title available?)
- Partial prime factor exposure attacks on some RSA variants
- Factoring multi-power RSA moduli with primes sharing least or most significant bits
- scientific article; zbMATH DE number 2219412 (Why is no real title available?)
- A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point
- Improvements to RSA key generation and CRT on embedded devices
- Factoring multi power RSA moduli with a class of secret exponents
- Further improvement of factoring \(N=p^rq^s\) with partial known bits
- A generalized attack on some variants of the RSA cryptosystem
- RSA Moduli with a Predetermined Portion: Techniques and Applications
- Forty years of attacks on the RSA cryptosystem: a brief survey
- Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)
- A new attack on some RSA variants
- An improved analysis on three variants of the RSA cryptosystem
- New number-theoretic cryptographic primitives
- A method for obtaining digital signatures and public-key cryptosystems
- scientific article; zbMATH DE number 1583953 (Why is no real title available?)
- Cryptanalysis of the RSA variant based on cubic Pell equation
- Improved cryptanalysis of the multi-prime \(\varphi\)-hiding assumption
- A new generalization of the KMOV cryptosystem
- A new partial key exposure attack on multi-power RSA
- Efficiency limitations for \(\Sigma \)-protocols for group homomorphisms
- Cryptanalysis of the multi-power RSA cryptosystem variant
- scientific article; zbMATH DE number 1759646 (Why is no real title available?)
- Cryptanalysis of Dual RSA
- A generalized attack on the multi-prime power RSA
- Revisiting prime power RSA
- Partial key exposure attacks on Prime Power RSA with non-consecutive blocks
- New Attacks on RSA with Moduli N = p r q
- Small secret exponent attack on RSA variant with modulus \(N=p^rq\)
- Exploiting the security of \(N= p^r q^s\) through approximation of \(\varphi(N)\)
- Iterative root approximation in \(p\)-adic numerical analysis
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249341)