11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY 158<br />

[9] J. Blömer and A. May. A generalized Wiener attack on <strong>RSA</strong>. In Proceedings<br />

<strong>of</strong> PKC’04, volume 2947 <strong>of</strong> Lecture Notes in Computer Science, pages 1–13,<br />

2004.<br />

[10] J. Blömer and A. May. A tool kit for finding small roots <strong>of</strong> bivariate polynomials<br />

over the integers. In Proceedings <strong>of</strong> Eurocrypt’05, volume 3494 <strong>of</strong><br />

Lecture Notes in Computer Science, pages 251–267, 2005.<br />

[11] D. Boneh. Twenty years <strong>of</strong> attacks on the <strong>RSA</strong> cryptosystem. Notices <strong>of</strong> the<br />

AMS, 46:203–213, 1999.<br />

[12] D. Boneh. Finding smooth integers in short intervals using CRT decoding.<br />

In Proceedings <strong>of</strong> STOC’00, pages 265–272, 2000.<br />

[13] D. Boneh. Finding smooth integers in short intervals using CRT decoding.<br />

Journal <strong>of</strong> Computer and System Sciences, 64(4):768–784, 2002.<br />

[14] D. Boneh and G. Durfee. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with private key less than<br />

N 0.292 . In Proceedings <strong>of</strong> Eurocrypt’99, volume 1592 <strong>of</strong> Lecture Notes in<br />

Computer Science, pages 1–11, 1999.<br />

[15] D. Boneh and G. Durfee. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with private key d less than<br />

N 0.292 . IEEE Transactions on Information Theory, 46:1339–1349, 2000.<br />

[16] D. Boneh, G. Durfee, and Y. Frankel. An attack on <strong>RSA</strong> given a small<br />

fraction <strong>of</strong> the private key bits. In Proceedings <strong>of</strong> Asiacrypt’98, volume 1514<br />

<strong>of</strong> Lecture Notes in Computer Science, pages 25–34, 1998.<br />

[17] D. Boneh, G. Durfee, and N. Howgrave-Graham. Factoring n = p r q for large<br />

r. In Proceedings <strong>of</strong> Crypto’99, volume 1666 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 326–337, 1999.<br />

[18] D. Boneh and R. Venkatesan. Breaking <strong>RSA</strong> may not be equivalent to<br />

factoring. In Proceedings <strong>of</strong> Eurocrypt’98, volume 1403 <strong>of</strong> Lecture Notes in<br />

Computer Science, pages 59–71, 1998.<br />

[19] D. R. L. Brown. Breaking <strong>RSA</strong> may be as difficult as factoring. Cryptology<br />

ePrint Archive, Report 2005/380, 2005. Available at http://eprint.iacr.<br />

org/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!