dissertacao.pdf
dissertacao.pdf
dissertacao.pdf
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
[27] Arjen K. Lenstra, Primality Testing, Proceedings of Symposia in Applied<br />
Mathematics, Mathematics and Computer Science.<br />
[28] Arjen K Lenstra, Unbelievable Security Matching AES Security Using Pub-<br />
lic Key Systems, Proceedings Asiacrypt 2001, LNCS 2248, Springer-Verlag<br />
2001, 6786, Springer-Verlag, 2001, pp. 67–86.<br />
[29] Neeraj Kayal Manindra Agrawal and Nitin Saxena, PRIMES is in P, Ann.<br />
of Math (2004).<br />
[30] A. May and M. Ritzenhofen, Solving Systems of Modular Equations in One<br />
Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?,<br />
Public Key Cryptography (2008).<br />
[31] Alexander May, Using LLL-Reduction for Solving RSA and Factorization<br />
Problems: A Survey, Journal of Cryptology (2010).<br />
[32] S.M. Mashihure Romman Md. Ali-Al-Mamun, Mohammad Motaharul Is-<br />
lam, Performance Evaluation of Several Efficient RSA Variants, Interna-<br />
tional Journal of Computer Science and Network Security (2008).<br />
[33] G. L. Miller, Riemann’s Hypothesis and Tests for Primality, Journal of<br />
Computer and System Sciences (1976).<br />
[34] P.L. Montgomery, Modular Multiplication Without Trial Division, Math.<br />
Computation (1985).<br />
[35] J. M. Pollard, A Monte Carlo Method for Factorization, BIT Numerical<br />
Mathematics (1975).<br />
[36] Carl Pomerance, A Tale of Two Sieves, Notices of the AMS (1996).<br />
[37] H. Riesel, Prime Numbers and Computer Methods for Factorization,<br />
Birkhauser, 1994.<br />
[38] A. Shamir R.L. Rivest and L. Adleman, A Method for Obtaining Digital<br />
Signatures and Public-Key Cryptosystems, Magazine Communications of<br />
the ACM (1978).<br />
[39] Josef Pieprzyk Huaxiong Wang Ron Steinfeld, Scott Contini, Converse Re-<br />
sults to the Wiener Attack on RSA, International Workshop on Practice<br />
and Theory in Public Key Cryptography (2005).<br />
54