Attacks on Low Private Exponent RSA: An Experimental Study
暂无分享,去创建一个
[1] Elaine Render,et al. A Survey of Attacks on the RSA Cryptosystem, with Implementations in Java , 2004 .
[2] Nigel P. Smart,et al. Cryptography: An Introduction , 2004 .
[3] Brigitte Vallée,et al. Gauss' Algorithm Revisited , 1991, J. Algorithms.
[4] Phong Q. Nguyen. Public-key Cryptanalysis , 2008 .
[5] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[6] Hung-Min Sun,et al. RSA with Balanced Short Exponents and Its Application to Entity Authentication , 2005, Public Key Cryptography.
[7] D. Boneh. Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .
[8] Hung-Min Sun,et al. On the Design of RSA With Short Secret Exponent , 2002, J. Inf. Sci. Eng..
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Andrej Dujella,et al. Continued fractions and RSA with small secret exponent , 2004, ArXiv.
[11] M. Jason Hinek,et al. On Some Attacks on Multi-prime RSA , 2002, Selected Areas in Cryptography.
[12] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[13] Don Coppersmith,et al. Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known , 1996, EUROCRYPT.