scientific article; zbMATH DE number 1182510

From MaRDI portal
Publication:4400575

zbMath0922.11113MaRDI QIDQ4400575

Nicholas Howgrave-Graham

Publication date: 3 October 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (81)

A Unified Framework for Small Secret Exponent Attack on RSACryptanalysis of Prime Power RSA with two private exponentsCryptanalysis of an RSA variant with moduli \(N=p^r q^l\)Attacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationClassical attacks on a variant of the RSA cryptosystemCryptanalysis of RSA variants with primes sharing most significant bitsSolving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generatorRecovering zeros of polynomials modulo a primeRemarks on the cryptanalysis of common prime RSA for IoT constrained low power devicesPartial Key Exposure Attack on CRT-RSAA New Partial Key Exposure Attack on Multi-power RSASmall secret exponent attack on RSA variant with modulus \(N=p^rq\)A new attack on some RSA variantsCryptanalytic results on `Dual CRT' and `Common Prime' RSAPractical attacks on small private exponent RSA: new records and new insights\textit{Caveat implementor!} Key recovery attacks on MEGAReconstructing points of superelliptic curves over a prime finite fieldThe hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applicationsA generalized attack on the multi-prime power RSAFinding points on elliptic curves with Coppersmith's methodA bivariate polynomial-based cryptographic hard problem and its applicationsFurther cryptanalysis of a type of RSA variantsAnother Generalization of Wiener’s Attack on RSADeterministic factoring with oraclesCryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate PolynomialsInferring sequences produced by the quadratic generatorImproving bounds on elliptic curve hidden number problem for ECDH key exchangeFast practical lattice reduction through iterated compressionPartial key exposure attack on short secret exponent CRT-RSACryptanalysis of the multi-power RSA cryptosystem variantA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingThe better bound of private key in RSA with unbalanced primesImproved cryptanalysis of the multi-power RSA cryptosystem variantSome lattice attacks on DSA and ECDSAExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsA Tool Kit for Partial Key Exposure Attacks on RSAAn Improved Analysis on Three Variants of the RSA CryptosystemPartial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier PolynomialImproved Results on Cryptanalysis of Prime Power RSAFurther improvement of factoring \(N=p^rq^s\) with partial known bitsA generalized attack on some variants of the RSA cryptosystemPrivately outsourcing exponentiation to a single server: cryptanalysis and optimal constructionsPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundImplicit Related-Key Factorization Problem on the RSA CryptosystemFinding smooth integers in short intervals using CRT decodingCryptanalysis of the RSA variant based on cubic Pell equationImproved Cryptanalysis of the Multi-Prime φ - Hiding AssumptionOn the optimality of lattices for the Coppersmith techniqueCryptanalysis of Dual RSAList decoding of number field codesCombined Attack on CRT-RSACoppersmith's lattices and ``focus groups: an attack on small-exponent RSAA new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSASmall CRT-Exponent RSA RevisitedSmall CRT-exponent RSA revisitedUnnamed ItemDivisors in residue classes, constructivelyPredicting nonlinear pseudorandom number generatorsCryptanalysis of RSA for a special case with \(d > e\)Symplectic Lattice Reduction and NTRUA method for obtaining digital signatures and public-key cryptosystemsUsing LLL-Reduction for Solving RSA and Factorization ProblemsSolving Linear Equations Modulo Divisors: On Factoring Given Any BitsFinding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystemCryptanalysis of RSA with two decryption exponentsPartial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsImproved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime FactorsLattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasuresCryptanalysis of elliptic curve hidden number problem from PKC 2017Towards Optimal Bounds for Implicit Factorization ProblemInferring sequences produced by a linear congruential generator on elliptic curves missing high-order bitsPartial Key Exposure Attacks on RSA with Multiple Exponent PairsSimplified High-Speed High-Distance List Decoding for Alternant CodesPartial Key Exposure: Generalized Framework to Attack RSAGeneralized cryptanalysis of small CRT-exponent RSACryptanalysis of Short Exponent RSA with Primes Sharing Least Significant BitsA small secret exponent attack on cryptosystems using Dickson polynomialsA Unified Method for Private Exponent Attacks on RSA Using LatticesRevisiting prime power RSAA new attack on RSA and Demytko’s elliptic curve cryptosystemForty years of attacks on the RSA cryptosystem: A brief survey




This page was built for publication: