14.07.2013 Views

dissertacao.pdf

dissertacao.pdf

dissertacao.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[27] Arjen K. Lenstra, Primality Testing, Proceedings of Symposia in Applied<br />

Mathematics, Mathematics and Computer Science.<br />

[28] Arjen K Lenstra, Unbelievable Security Matching AES Security Using Pub-<br />

lic Key Systems, Proceedings Asiacrypt 2001, LNCS 2248, Springer-Verlag<br />

2001, 6786, Springer-Verlag, 2001, pp. 67–86.<br />

[29] Neeraj Kayal Manindra Agrawal and Nitin Saxena, PRIMES is in P, Ann.<br />

of Math (2004).<br />

[30] A. May and M. Ritzenhofen, Solving Systems of Modular Equations in One<br />

Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?,<br />

Public Key Cryptography (2008).<br />

[31] Alexander May, Using LLL-Reduction for Solving RSA and Factorization<br />

Problems: A Survey, Journal of Cryptology (2010).<br />

[32] S.M. Mashihure Romman Md. Ali-Al-Mamun, Mohammad Motaharul Is-<br />

lam, Performance Evaluation of Several Efficient RSA Variants, Interna-<br />

tional Journal of Computer Science and Network Security (2008).<br />

[33] G. L. Miller, Riemann’s Hypothesis and Tests for Primality, Journal of<br />

Computer and System Sciences (1976).<br />

[34] P.L. Montgomery, Modular Multiplication Without Trial Division, Math.<br />

Computation (1985).<br />

[35] J. M. Pollard, A Monte Carlo Method for Factorization, BIT Numerical<br />

Mathematics (1975).<br />

[36] Carl Pomerance, A Tale of Two Sieves, Notices of the AMS (1996).<br />

[37] H. Riesel, Prime Numbers and Computer Methods for Factorization,<br />

Birkhauser, 1994.<br />

[38] A. Shamir R.L. Rivest and L. Adleman, A Method for Obtaining Digital<br />

Signatures and Public-Key Cryptosystems, Magazine Communications of<br />

the ACM (1978).<br />

[39] Josef Pieprzyk Huaxiong Wang Ron Steinfeld, Scott Contini, Converse Re-<br />

sults to the Wiener Attack on RSA, International Workshop on Practice<br />

and Theory in Public Key Cryptography (2005).<br />

54

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!