Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Using LLL-Reduction for Solving RSA and Factorization Problems - MaRDI portal

Using LLL-Reduction for Solving RSA and Factorization Problems

From MaRDI portal
Publication:5188546

DOI10.1007/978-3-642-02295-1_10zbMath1237.94078OpenAlexW10068438MaRDI QIDQ5188546

Alexander May

Publication date: 5 March 2010

Published in: The LLL Algorithm (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-02295-1_10




Related Items (23)

An application of Euclidean algorithm in cryptanalysis of RSAFactoring multi-power RSA moduli with primes sharing least or most significant bitsApproximate divisor multiples -- factoring with only a third of the secret CRT-exponentsRemarks on the cryptanalysis of common prime RSA for IoT constrained low power devices\textit{Caveat implementor!} Key recovery attacks on MEGACryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate PolynomialsImproving bounds on elliptic curve hidden number problem for ECDH key exchangeFast practical lattice reduction through iterated compressionExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsFactoring multi power RSA moduli with a class of secret exponentsRecovering a sum of two squares decompositionA Tool Kit for Partial Key Exposure Attacks on RSAA generalized attack on some variants of the RSA cryptosystemPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundCryptanalysis of the RSA variant based on cubic Pell equationSmall CRT-Exponent RSA RevisitedSmall CRT-exponent RSA revisitedSmallest Reduction Matrix of Binary Quadratic FormsPartial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsIdeal forms of Coppersmith's theorem and Guruswami-Sudan list decodingCryptanalysis of elliptic curve hidden number problem from PKC 2017Partial Key Exposure Attacks on RSA with Multiple Exponent PairsGeneralized cryptanalysis of small CRT-exponent RSA



Cites Work


This page was built for publication: Using LLL-Reduction for Solving RSA and Factorization Problems