scientific article; zbMATH DE number 1182510
From MaRDI portal
Publication:4400575
zbMATH Open0922.11113MaRDI QIDQ4400575FDOQ4400575
Publication date: 3 October 1999
Title of this publication is not available (Why is that?)
Recommendations
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16)
Cited In (94)
- Cryptanalysis of the RSA variant based on cubic Pell equation
- Forty years of attacks on the RSA cryptosystem: A brief survey
- Further improvement of factoring \(N=p^rq^s\) with partial known bits
- A generalized attack on some variants of the RSA cryptosystem
- Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound
- Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial
- Generalized cryptanalysis of small CRT-exponent RSA
- On the optimality of lattices for the Coppersmith technique
- A Unified Method for Private Exponent Attacks on RSA Using Lattices
- Title not available (Why is that?)
- Revisiting prime power RSA
- Small secret exponent attack on RSA variant with modulus \(N=p^rq\)
- A new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSA
- A Tool Kit for Partial Key Exposure Attacks on RSA
- Coppersmith's lattices and ``focus groups: an attack on small-exponent RSA
- Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate Polynomials
- The better bound of private key in RSA with unbalanced primes
- Using LLL-Reduction for Solving RSA and Factorization Problems
- Further cryptanalysis of a type of RSA variants
- Towards Optimal Bounds for Implicit Factorization Problem
- Divisors in residue classes, constructively
- Small CRT-exponent RSA revisited
- Cryptanalytic results on `Dual CRT' and `Common Prime' RSA
- Some lattice attacks on DSA and ECDSA
- Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits
- Cryptanalysis of RSA with two decryption exponents
- A new attack on some RSA variants
- Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
- Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
- Finding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystem
- An Improved Analysis on Three Variants of the RSA Cryptosystem
- A Unified Framework for Small Secret Exponent Attack on RSA
- Partial key exposure attack on short secret exponent CRT-RSA
- Title not available (Why is that?)
- List decoding of number field codes
- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
- Improving bounds on elliptic curve hidden number problem for ECDH key exchange
- A New Partial Key Exposure Attack on Multi-power RSA
- Classical attacks on a variant of the RSA cryptosystem
- Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator
- Simplified High-Speed High-Distance List Decoding for Alternant Codes
- Cryptanalysis of RSA variants with primes sharing most significant bits
- Improved Results on Cryptanalysis of Prime Power RSA
- Cryptanalysis of RSA for a special case with \(d > e\)
- Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures
- A new attack on RSA and Demytko’s elliptic curve cryptosystem
- Improved Cryptanalysis of the Multi-Prime φ - Hiding Assumption
- Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)
- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
- Partial Key Exposure: Generalized Framework to Attack RSA
- Finding points on elliptic curves with Coppersmith's method
- Finding smooth integers in short intervals using CRT decoding
- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
- Another Generalization of Wiener’s Attack on RSA
- Title not available (Why is that?)
- Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
- Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017
- Cryptanalysis of Prime Power RSA with two private exponents
- Recovering zeros of polynomials modulo a prime
- Small CRT-Exponent RSA Revisited
- A method for obtaining digital signatures and public-key cryptosystems
- Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits
- Cryptanalysis of Dual RSA
- Deterministic factoring with oracles
- Symplectic Lattice Reduction and NTRU
- Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents
- Combined Attack on CRT-RSA
- Predicting nonlinear pseudorandom number generators
- Finding small roots for bivariate polynomials over the ring of integers
- Fast practical lattice reduction through iterated compression
- Improved Herrmann-May's attack with merging variables and lower LLL bound
- Implicit Related-Key Factorization Problem on the RSA Cryptosystem
- A small secret exponent attack on cryptosystems using Dickson polynomials
- Partial Key Exposure Attack on CRT-RSA
- Improved cryptanalysis of the multi-power RSA cryptosystem variant
- Generalized implicit factorization problem
- Partial key exposure attacks on Prime Power RSA with non-consecutive blocks
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Reconstructing points of superelliptic curves over a prime finite field
- The hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applications
- New Results of Breaking the CLS Scheme from ACM-CCS 2014
- Formalizing Coppersmith's method in Isabelle/HOL
- A bivariate polynomial-based cryptographic hard problem and its applications
- Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves
- Partial prime factor exposure attacks on some RSA variants
- A generalized attack on the multi-prime power RSA
- Implicit-key attack on the RSA cryptosystem
- Practical attacks on small private exponent RSA: new records and new insights
- Solving modular cubic equations with Coppersmith's method
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
- Cryptanalysis of the multi-power RSA cryptosystem variant
- Inferring sequences produced by the quadratic generator
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4400575)