Publishing Upper Half of RSA Decryption Exponent
暂无分享,去创建一个
[1] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[2] J. Quisquater,et al. Fast decipherment algorithm for RSA public-key cryptosystem , 1982 .
[3] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[4] Scott A. Vanstone,et al. Short RSA keys and their generation , 2004, Journal of Cryptology.
[5] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[6] Igor E. Shparlinski,et al. On the Insecurity of a Server-Aided RSA Protocol , 2001, ASIACRYPT.
[7] Santanu Sarkar,et al. Efficient CRT-RSA Decryption for Small Encryption Exponents , 2010, CT-RSA.
[8] Dan Boneh,et al. Cryptanalysis of RSA with private key d less than N0.292 , 2000, IEEE Trans. Inf. Theory.
[9] A. K. Lenstra,et al. The Development of the Number Field Sieve , 1993 .
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[11] Arjen K. Lenstra,et al. Generating RSA Moduli with a Predetermined Portion , 1998, ASIACRYPT.
[12] Hideki Imai,et al. Speeding Up Secret Computations with Insecure Auxiliary Devices , 1988, CRYPTO.
[13] Masao Kasahara,et al. New Key Generation Algorithm for RSA Cryptosystem , 1994 .
[14] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[15] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] Don Coppersmith,et al. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities , 1997, Journal of Cryptology.
[18] Eric R. Verheul,et al. Cryptanalysis of ‘Less Short’ RSA Secret Exponents , 1997, Applicable Algebra in Engineering, Communication and Computing.
[19] Benne de Weger,et al. Cryptanalysis of RSA with Small Prime Difference , 2002, Applicable Algebra in Engineering, Communication and Computing.