Contribution oo the Theory and Practice of Generating RSA Algorithm Keys
暂无分享,去创建一个
Milan Milosavljević | Predrag Milosav | Zoran Banjac | Tomislav Unkašević | Medhat Abdelrahman MohamedMostafa | M. Milosavljevic | Z. Banjac | T. Unkašević | Predrag Milosav | Medhat Abdelrahman MohamedMostafa | Medhat Abdelrahman MohamedMostafa
[1] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[2] Vashek Matyas,et al. The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli , 2017, CCS.
[3] Карл Норрман,et al. Cryptographic key generation , 2008 .
[4] Vashek Matyas,et al. The Million-Key Question - Investigating the Origins of RSA Public Keys , 2016, USENIX Security Symposium.
[5] R. Lehman. Factoring large integers , 1974 .
[6] Ueli Maurer,et al. Breaking RSA Generically Is Equivalent to Factoring , 2009, IEEE Transactions on Information Theory.
[7] Song Y. Yan,et al. Cryptanalytic attacks on RSA , 2007 .
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[10] Arjen K. Lenstra,et al. Ron was wrong, Whit is right , 2012, IACR Cryptol. ePrint Arch..
[11] Tanja Lange,et al. Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..
[12] D. Boneh. Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .
[13] Benne de Weger,et al. Cryptanalysis of RSA with Small Prime Difference , 2002, Applicable Algebra in Engineering, Communication and Computing.
[14] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[15] John Kelsey,et al. Recommendation for Random Bit Generator (RBG) Constructions , 2016 .
[16] Elaine B. Barker,et al. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography | NIST , 2009 .