Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1302856 - MaRDI portal

scientific article; zbMATH DE number 1302856

From MaRDI portal
Publication:4249341

zbMath0931.94041MaRDI QIDQ4249341

Tsuyoshi Takagi

Publication date: 8 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (32)

Improvements to RSA key generation and CRT on embedded devicesFactoring multi-power RSA moduli with primes sharing least or most significant bitsCryptanalysis of Prime Power RSA with two private exponentsCryptanalysis of an RSA variant with moduli \(N=p^r q^l\)A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointExploiting the security of N = prqs through approximation of ϕ(N)Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devicesA generalized attack on RSA type cryptosystemsComment on ``An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)New Attacks on RSA with Moduli N = p r qA New Partial Key Exposure Attack on Multi-power RSASmall secret exponent attack on RSA variant with modulus \(N=p^rq\)A new attack on some RSA variantsA generalized attack on the multi-prime power RSAAn Adaptation of the NICE Cryptosystem to Real Quadratic OrdersCryptanalysis of the multi-power RSA cryptosystem variantImproved cryptanalysis of the multi-power RSA cryptosystem variantFactoring multi power RSA moduli with a class of secret exponentsAn Improved Analysis on Three Variants of the RSA CryptosystemFurther improvement of factoring \(N=p^rq^s\) with partial known bitsA generalized attack on some variants of the RSA cryptosystemCryptanalysis of the RSA variant based on cubic Pell equationImproved Cryptanalysis of the Multi-Prime φ - Hiding AssumptionCryptanalysis of Dual RSAA method for obtaining digital signatures and public-key cryptosystemsNew number-theoretic cryptographic primitivesA new generalization of the KMOV cryptosystemRSA Moduli with a Predetermined Portion: Techniques and ApplicationsEfficiency Limitations for Σ-Protocols for Group HomomorphismsIterative root approximation in \(p\)-adic numerical analysisRevisiting prime power RSAForty years of attacks on the RSA cryptosystem: A brief survey




This page was built for publication: