Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Breaking RSA may not be equivalent to factoring - MaRDI portal

Breaking RSA may not be equivalent to factoring

From MaRDI portal
Publication:4249628

DOI10.1007/BFb0054117zbMath0922.94008WikidataQ56029172 ScholiaQ56029172MaRDI QIDQ4249628

Dan Boneh, Ramarathnam Venkatesan

Publication date: 10 October 1999

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)




Related Items (36)

Concurrent knowledge extraction in public-key modelsBreaking RSA may be as difficult as factoringOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessOn the security loss of unique signaturesOn the analysis of cryptographic assumptions in the generic ring modelAnother look at extraction and randomization of Groth's zk-SNARKUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsOptimal tightness for chain-based unique signaturesRSA: a number of formulas to improve the search for \(p+q\)RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystemsOn pairing-free blind signature schemes in the algebraic group modelOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessLifting standard model reductions to common setup assumptionsThe price of verifiability: lower bounds for verifiable random functionsAn analysis of the algebraic group modelLattice-based programmable hash functions and applicationsHow to fake an RSA signature by encoding modular root finding as a SAT problemOn the adaptive security of MACs and PRFsThe cost of adaptivity in security games on graphsTowards tight adaptive security of non-interactive key exchangeBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesUsing LLL-Reduction for Solving RSA and Factorization ProblemsImproved Bounds on Security Reductions for Discrete Log Based SignaturesSolving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?A New Rabin-type Trapdoor Permutation Equivalent to FactoringAlgebraic cryptography: new constructions and their security against provable breakSignatures from sequential-OR proofsBreaking RSA Generically Is Equivalent to FactoringImpossibility on tamper-resilient cryptography with uniqueness propertiesProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesOn Related-Secret PseudorandomnessBlack-box use of one-way functions is useless for optimal fair coin-tossingGenerically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functionsOn instantiating the algebraic group model from falsifiable assumptions




This page was built for publication: Breaking RSA may not be equivalent to factoring