Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428109

DOI10.1007/b11817zbMath1122.94353OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428109

Johannes Blömer, Alexander May

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items

Cryptanalysis of Prime Power RSA with two private exponentsAttacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationApproximate divisor multiples -- factoring with only a third of the secret CRT-exponentsPartial Key Exposure Attack on CRT-RSAA New Partial Key Exposure Attack on Multi-power RSAPartial key exposure attacks on BIKE, Rainbow and NTRUContinued fractions applied to a family of RSA-like cryptosystemsFurther cryptanalysis of a type of RSA variantsExploring decryption failures of BIKE: new class of weak keys and key recovery attacksPartial key exposure attack on short secret exponent CRT-RSAOn the Improvement of the BDF Attack on LSBS-RSAA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsA Tool Kit for Partial Key Exposure Attacks on RSAPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundOn the optimality of lattices for the Coppersmith techniqueOn the security of RSA with primes sharing least-significant bitsSmall CRT-Exponent RSA RevisitedSmall CRT-exponent RSA revisitedFast LLL-type lattice reductionA method for obtaining digital signatures and public-key cryptosystemsUsing LLL-Reduction for Solving RSA and Factorization ProblemsFinding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystemPartial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsImproved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime FactorsIdeal forms of Coppersmith's theorem and Guruswami-Sudan list decodingPartial Key Exposure Attacks on RSA with Multiple Exponent PairsPartial Key Exposure: Generalized Framework to Attack RSAGeneralized cryptanalysis of small CRT-exponent RSACryptanalysis of Short Exponent RSA with Primes Sharing Least Significant BitsRevisiting prime power RSA


Uses Software