scientific article; zbMATH DE number 1302856
From MaRDI portal
Publication:4249341
zbMATH Open0931.94041MaRDI QIDQ4249341FDOQ4249341
Authors: Tsuyoshi Takagi
Publication date: 8 March 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (39)
- Improvements to RSA key generation and CRT on embedded devices
- Cryptanalysis of the RSA variant based on cubic Pell equation
- Forty years of attacks on the RSA cryptosystem: A brief survey
- Further improvement of factoring \(N=p^rq^s\) with partial known bits
- A generalized attack on some variants of the RSA cryptosystem
- Revisiting prime power RSA
- New Attacks on RSA with Moduli N = p r q
- Small secret exponent attack on RSA variant with modulus \(N=p^rq\)
- Title not available (Why is that?)
- Factoring multi-power RSA moduli with primes sharing least or most significant bits
- A generalized attack on RSA type cryptosystems
- A new attack on some RSA variants
- A new generalization of the KMOV cryptosystem
- New number-theoretic cryptographic primitives
- An Improved Analysis on Three Variants of the RSA Cryptosystem
- A New Partial Key Exposure Attack on Multi-power RSA
- Improved cryptanalysis of the multi-power RSA cryptosystem variant
- A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point
- An Adaptation of the NICE Cryptosystem to Real Quadratic Orders
- Title not available (Why is that?)
- Improved Cryptanalysis of the Multi-Prime φ - Hiding Assumption
- Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)
- Partial key exposure attacks on Prime Power RSA with non-consecutive blocks
- Comment on ``An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)
- Factoring multi power RSA moduli with a class of secret exponents
- Efficiency limitations for \(\Sigma \)-protocols for group homomorphisms
- Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices
- Title not available (Why is that?)
- Fast square-free decomposition of integers using class groups
- Cryptanalysis of Prime Power RSA with two private exponents
- Title not available (Why is that?)
- Partial prime factor exposure attacks on some RSA variants
- A method for obtaining digital signatures and public-key cryptosystems
- A generalized attack on the multi-prime power RSA
- RSA Moduli with a Predetermined Portion: Techniques and Applications
- Cryptanalysis of Dual RSA
- Exploiting the security of N = prqs through approximation of ϕ(N)
- Iterative root approximation in \(p\)-adic numerical analysis
- Cryptanalysis of the multi-power RSA cryptosystem variant
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249341)