Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Bibliography<br />
[1] Advanced Encryption Standard. National Institute <strong>of</strong> Standards and Technology,<br />
2001. Available at http://csrc.nist.gov/CryptoToolkit/aes/<br />
rijndael/.<br />
[2] D. Aggarwal and U. M. Maurer. Breaking <strong>RSA</strong> generically is equivalent to<br />
factoring. In Proceedings <strong>of</strong> Eurocrypt’09, volume 5479 <strong>of</strong> Lecture Notes in<br />
Computer Science, pages 36–53, 2009.<br />
[3] M. Agrawal, N. Kayal, and N. Saxena. Primes is in P. Annals <strong>of</strong> Mathematics,<br />
2:781–793, 2002.<br />
[4] M.AjtaiandC.Dwork. Apublic-keycryptosystemwithworst-case/averagecase<br />
equivalence. Electronic Colloquium on Computational Complexity<br />
(ECCC), 3(65), 1996.<br />
[5] M.AjtaiandC.Dwork. Apublic-keycryptosystemwithworst-case/averagecase<br />
equivalence. In Proceedings <strong>of</strong> STOC’97, pages 284–293, 1997.<br />
[6] A. O. L. Atkin and F. Morain. Elliptic curves and primality proving. Mathematics<br />
<strong>of</strong> Computation, 61:29–68, 1993.<br />
[7] A. Bauer and A. Joux. Toward a rigorous variation <strong>of</strong> Coppersmith’s algorithm<br />
on three variables. In Proceedings <strong>of</strong> Eurocrypt’07, volume 4515 <strong>of</strong><br />
Lecture Notes in Computer Science, pages 361–378, 2007.<br />
[8] J. Blömer and A. May. New partial key exposure attacks on <strong>RSA</strong>. In<br />
Proceedings <strong>of</strong> Crypto’03,volume2729<strong>of</strong>Lecture Notes in Computer Science,<br />
pages 27–43, 2003.<br />
157