Cryptanalytic results on ‘Dual CRT’ and ‘Common Prime’ RSA
暂无分享,去创建一个
[1] Dan Boneh,et al. Exposing an RSA Private Key Given a Small Fraction of its Bits , 1998 .
[2] Charles C. Y. Lam,et al. On the security of some variants of rsa , 2007 .
[3] Alexander May,et al. Cryptanalysis of Unbalanced RSA with Small CRT-Exponent , 2002, CRYPTO.
[4] A. K. Lenstra,et al. The Development of the Number Field Sieve , 1993 .
[5] Carl Pomerance,et al. The Development of the Number Field Sieve , 1994 .
[6] Don Coppersmith,et al. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities , 1997, Journal of Cryptology.
[7] D. Boneh. Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .
[8] Alexander May,et al. A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073 , 2007, CRYPTO.
[9] M. Jason Hinek,et al. Another Look at Small RSA Exponents , 2006, CT-RSA.
[10] Alexander May,et al. New Attacks on RSA with Small Secret CRT-Exponents , 2006, Public Key Cryptography.
[11] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[12] J. Quisquater,et al. Fast decipherment algorithm for RSA public-key cryptosystem , 1982 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[15] Steven D. Galbraith,et al. Tunable Balancing of RSA , 2005, ACISP.
[16] Hung-Min Sun,et al. Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.
[17] Alexander May,et al. A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants , 2006, ASIACRYPT.
[18] Nick Howgrave-Graham,et al. Finding Small Roots of Univariate Modular Equations Revisited , 1997, IMACC.
[19] M. Hinek. Cryptanalysis of RSA and Its Variants , 2009 .
[20] Maike Ritzenhofen,et al. On efficiently calculating small solutions of systems of polynomial equations: lattice-based methods and applications to cryptography , 2010 .
[21] Chae Hoon Lim,et al. Security and Performance of Server-Aided RSA Computation Protocols , 1995, CRYPTO.
[22] Dan Boneh,et al. An Attack on RSA Given a Small Fraction of the Private Key Bits , 1998, ASIACRYPT.