Pages that link to "Item:Q3483214"
From MaRDI portal
The following pages link to Cryptanalysis of short RSA secret exponents (Q3483214):
Displaying 50 items.
- Revisiting prime power RSA (Q260044) (← links)
- An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics (Q268490) (← links)
- An active attack on protocols for server-aided RSA signature computation (Q293187) (← links)
- Attacks on Shamir's `RSA for paranoids' (Q293447) (← links)
- Primes in quadratic unique factorization domains (Q301417) (← links)
- A semantically secure public key cryptoscheme using bit-pair shadows (Q344780) (← links)
- A provably secure non-iterative hash function resisting birthday attack (Q344781) (← links)
- Small secret exponent attack on RSA variant with modulus \(N=p^rq\) (Q398942) (← links)
- A public key cryptosystem based on three new provable problems (Q418738) (← links)
- Cryptanalysis of Dual RSA (Q517262) (← links)
- On the number of sparse RSA exponents (Q701120) (← links)
- On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA (Q834923) (← links)
- A new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSA (Q966349) (← links)
- Cryptanalysis of RSA with two decryption exponents (Q991745) (← links)
- Cryptanalysis of RSA with more than one decryption exponent (Q991798) (← links)
- Batch RSA (Q1363068) (← links)
- The better bound of private key in RSA with unbalanced primes (Q1406195) (← links)
- Cryptanalysis of short secret exponents modulo RSA primes. (Q1429863) (← links)
- Large decryption exponents in RSA (Q1431928) (← links)
- The multi-dimension RSA and its low exponent security (Q1589779) (← links)
- Factoring RSA moduli with primes sharing bits in the middle (Q1647745) (← links)
- A generalized attack on RSA type cryptosystems (Q1680536) (← links)
- A generalized attack on some variants of the RSA cryptosystem (Q1726690) (← links)
- Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound (Q1727391) (← links)
- Mathematical problems in cryptology (Q1910812) (← links)
- Cryptanalytic results on `Dual CRT' and `Common Prime' RSA (Q1934238) (← links)
- A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations (Q1981778) (← links)
- Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA (Q1998906) (← links)
- Small CRT-exponent RSA revisited (Q2010590) (← links)
- Finding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystem (Q2025379) (← links)
- Classical attacks on a variant of the RSA cryptosystem (Q2146087) (← links)
- Cryptanalysis of RSA variants with primes sharing most significant bits (Q2154038) (← links)
- Fast rebalanced RSA signature scheme with typical prime generation (Q2182709) (← links)
- Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents (Q2202020) (← links)
- Cryptanalysis of the RSA variant based on cubic Pell equation (Q2232613) (← links)
- The improved QV signature scheme based on conic curves over \(\mathbb Z_n\) (Q2267090) (← links)
- Cryptanalysis of RSA for a special case with \(d > e\) (Q2267091) (← links)
- Generalized cryptanalysis of small CRT-exponent RSA (Q2330126) (← links)
- Security pitfalls of an efficient threshold proxy signature scheme for mobile agents (Q2350583) (← links)
- Cryptanalysis of RSA with a small parameter revisited (Q2353653) (← links)
- A variant of Wiener's attack on RSA (Q2390948) (← links)
- Speeding up exponentiation using an untrusted computational resource (Q2491304) (← links)
- A new attack on RSA with two or three decryption exponents (Q2511362) (← links)
- Cryptanalysis of large RSA exponent by using the LLL algorithm (Q2572356) (← links)
- A novel cryptosystem based on grey system theory and genetic algorithm (Q2573591) (← links)
- Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\) (Q2628124) (← links)
- Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices (Q2666752) (← links)
- Comment on ``An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)'' (Q2671806) (← links)
- Improving small private exponent attack on the Murru-Saettone cryptosystem (Q2672624) (← links)
- Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents (Q2794514) (← links)