A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
From MaRDI portal
Publication:5459084
Recommendations
- scientific article; zbMATH DE number 1182510
- An algorithm for finding small roots of multivariate polynomials over the integers
- Toward a Rigorous Variation of Coppersmith’s Algorithm on Three Variables
- Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
- scientific article; zbMATH DE number 1303120
Cited in
(51)- Inferring sequences produced by the quadratic generator
- Cryptanalysis of the RSA variant based on cubic Pell equation
- Finding small roots for bivariate polynomials over the ring of integers
- Revisiting RSA-polynomial problem and semiprime factorization
- A generalized attack on some variants of the RSA cryptosystem
- Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound
- On the optimality of lattices for the Coppersmith technique
- Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents
- Attacking RSA with a composed decryption exponent using unravelled linearization
- An improved analysis on three variants of the RSA cryptosystem
- A new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSA
- Coppersmith's lattices and ``focus groups: an attack on small-exponent RSA
- Small CRT-exponent RSA revisited
- Cryptanalytic results on `Dual CRT' and `Common Prime' RSA
- Further cryptanalysis of a type of RSA variants
- Improved results on cryptanalysis of prime power RSA
- Cryptographic applications of capacity theory: on the optimality of Coppersmith's method for univariate polynomials
- Cryptanalysis of RSA with two decryption exponents
- Cryptanalysis of RSA with more than one decryption exponent
- The polynomial approximate common divisor problem and its application to the fully homomorphic encryption
- Partial key exposure: generalized framework to attack RSA
- A unified method for private exponent attacks on RSA using lattices
- Combined attack on CRT-RSA. Why public verification must not be public?
- scientific article; zbMATH DE number 7528065 (Why is no real title available?)
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith
- Forty years of attacks on the RSA cryptosystem: a brief survey
- Classical attacks on a variant of the RSA cryptosystem
- Improving bounds on elliptic curve hidden number problem for ECDH key exchange
- Attacks on pseudo random number generators hiding a linear structure
- On the Security of Supersingular Isogeny Cryptosystems
- Inferring Sequences Produced by a Linear Congruential Generator on Elliptic Curves Using Coppersmith’s Methods
- Using LLL-reduction for solving RSA and factorization problems
- On the security of multi-prime RSA
- On the possibility of a backdoor in the Micali-Schnorr generator
- Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents
- Reconstructing points of superelliptic curves over a prime finite field
- Finding points on elliptic curves with Coppersmith's method
- Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices
- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA
- New Results of Breaking the CLS Scheme from ACM-CCS 2014
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017
- Fast rebalanced RSA signature scheme with typical prime generation
- Partial prime factor exposure attacks on some RSA variants
- Recovering zeros of polynomials modulo a prime
- Inferring sequences produced by elliptic curve generators using Coppersmith's methods
- Small CRT-Exponent RSA Revisited
- A tool kit for partial key exposure attacks on RSA
- Implicit-key attack on the RSA cryptosystem
- Cryptanalysis of Dual RSA
- Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents
- Solving modular cubic equations with Coppersmith's method
This page was built for publication: A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5459084)