Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
BIBLIOGRAPHY 158<br />
[9] J. Blömer and A. May. A generalized Wiener attack on <strong>RSA</strong>. In Proceedings<br />
<strong>of</strong> PKC’04, volume 2947 <strong>of</strong> Lecture Notes in Computer Science, pages 1–13,<br />
2004.<br />
[10] J. Blömer and A. May. A tool kit for finding small roots <strong>of</strong> bivariate polynomials<br />
over the integers. In Proceedings <strong>of</strong> Eurocrypt’05, volume 3494 <strong>of</strong><br />
Lecture Notes in Computer Science, pages 251–267, 2005.<br />
[11] D. Boneh. Twenty years <strong>of</strong> attacks on the <strong>RSA</strong> cryptosystem. Notices <strong>of</strong> the<br />
AMS, 46:203–213, 1999.<br />
[12] D. Boneh. Finding smooth integers in short intervals using CRT decoding.<br />
In Proceedings <strong>of</strong> STOC’00, pages 265–272, 2000.<br />
[13] D. Boneh. Finding smooth integers in short intervals using CRT decoding.<br />
Journal <strong>of</strong> Computer and System Sciences, 64(4):768–784, 2002.<br />
[14] D. Boneh and G. Durfee. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with private key less than<br />
N 0.292 . In Proceedings <strong>of</strong> Eurocrypt’99, volume 1592 <strong>of</strong> Lecture Notes in<br />
Computer Science, pages 1–11, 1999.<br />
[15] D. Boneh and G. Durfee. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with private key d less than<br />
N 0.292 . IEEE Transactions on Information Theory, 46:1339–1349, 2000.<br />
[16] D. Boneh, G. Durfee, and Y. Frankel. An attack on <strong>RSA</strong> given a small<br />
fraction <strong>of</strong> the private key bits. In Proceedings <strong>of</strong> Asiacrypt’98, volume 1514<br />
<strong>of</strong> Lecture Notes in Computer Science, pages 25–34, 1998.<br />
[17] D. Boneh, G. Durfee, and N. Howgrave-Graham. Factoring n = p r q for large<br />
r. In Proceedings <strong>of</strong> Crypto’99, volume 1666 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 326–337, 1999.<br />
[18] D. Boneh and R. Venkatesan. Breaking <strong>RSA</strong> may not be equivalent to<br />
factoring. In Proceedings <strong>of</strong> Eurocrypt’98, volume 1403 <strong>of</strong> Lecture Notes in<br />
Computer Science, pages 59–71, 1998.<br />
[19] D. R. L. Brown. Breaking <strong>RSA</strong> may be as difficult as factoring. Cryptology<br />
ePrint Archive, Report 2005/380, 2005. Available at http://eprint.iacr.<br />
org/.