A Formal Analysis for RSA Attacks by Term Rewriting Systems
暂无分享,去创建一个
[1] Dan Boneh,et al. An Attack on RSA Given a Small Fraction of the Private Key Bits , 1998, ASIACRYPT.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Tobias Nipkow,et al. Term rewriting and all that , 1998 .
[4] Hans Zantema. TORPA: Termination of Rewriting Proved Automatically , 2004, RTA.
[5] Sattar J Aboud,et al. An efficient method for attack RSA scheme , 2009, 2009 Second International Conference on the Applications of Digital Information and Web Technologies.
[6] Dan Boneh,et al. Cryptanalysis of RSA with private key d less than N0.292 , 2000, IEEE Trans. Inf. Theory.
[7] Allam Mousa. Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm , 2005 .
[8] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[9] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[10] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[11] Carl Pomerance,et al. A Tale of Two Sieves , 1998 .
[12] Song Y. Yan,et al. Cryptanalytic attacks on RSA , 2007 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.