Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits
暂无分享,去创建一个
Santanu Sarkar | Subhamoy Maitra | Sourav Sengupta | S. Maitra | Santanu Sarkar | Sourav Sen Gupta | Sourav Sengupta
[1] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[2] Dan Boneh,et al. Exposing an RSA Private Key Given a Small Fraction of its Bits , 1998 .
[3] Hovav Shacham,et al. Available from the IACR Cryptology ePrint Archive as Report 2008/510. Reconstructing RSA Private Keys from Random Key Bits , 2022 .
[4] Franz Pichler,et al. Advances in Cryptology — EUROCRYPT’ 85 , 2000, Lecture Notes in Computer Science.
[5] Alexander May,et al. A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants , 2006, ASIACRYPT.
[6] Kefei Chen,et al. Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.
[7] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.
[8] Nick Howgrave-Graham,et al. Finding Small Roots of Univariate Modular Equations Revisited , 1997, IMACC.
[9] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[10] Dan Boneh,et al. An Attack on RSA Given a Small Fraction of the Private Key Bits , 1998, ASIACRYPT.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[13] Adi Shamir,et al. Efficient Factoring Based on Partial Information , 1985, EUROCRYPT.
[14] Alexander May,et al. Using LLL-Reduction for Solving RSA and Factorization Problems , 2010, The LLL Algorithm.
[15] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[16] Josef Pieprzyk,et al. Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.
[17] Don Coppersmith,et al. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities , 1997, Journal of Cryptology.
[18] Alexander May,et al. Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits , 2008, ASIACRYPT.
[19] László Csirmaz,et al. The Size of a Share Must Be Large , 1994, Journal of Cryptology.