Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428109
DOI10.1007/b11817zbMath1122.94353OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428109
Johannes Blömer, Alexander May
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Related Items
Cryptanalysis of Prime Power RSA with two private exponents ⋮ Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization ⋮ Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents ⋮ Partial Key Exposure Attack on CRT-RSA ⋮ A New Partial Key Exposure Attack on Multi-power RSA ⋮ Partial key exposure attacks on BIKE, Rainbow and NTRU ⋮ Continued fractions applied to a family of RSA-like cryptosystems ⋮ Further cryptanalysis of a type of RSA variants ⋮ Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks ⋮ Partial key exposure attack on short secret exponent CRT-RSA ⋮ On the Improvement of the BDF Attack on LSBS-RSA ⋮ A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding ⋮ Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents ⋮ A Tool Kit for Partial Key Exposure Attacks on RSA ⋮ Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound ⋮ On the optimality of lattices for the Coppersmith technique ⋮ On the security of RSA with primes sharing least-significant bits ⋮ Small CRT-Exponent RSA Revisited ⋮ Small CRT-exponent RSA revisited ⋮ Fast LLL-type lattice reduction ⋮ A method for obtaining digital signatures and public-key cryptosystems ⋮ Using LLL-Reduction for Solving RSA and Factorization Problems ⋮ Finding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystem ⋮ Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents ⋮ Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors ⋮ Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding ⋮ Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs ⋮ Partial Key Exposure: Generalized Framework to Attack RSA ⋮ Generalized cryptanalysis of small CRT-exponent RSA ⋮ Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits ⋮ Revisiting prime power RSA
Uses Software