11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY 162<br />

[54] M.J.Hinek. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> and Its Variants. Chapman&Hall/CRC,<br />

2009.<br />

[55] M. J. Hinek and C. C. Y. Lam. Common modulus attacks on small private<br />

exponent <strong>RSA</strong> and some fast variants (in practice). Journal <strong>of</strong> Mathematical<br />

Cryptology, 4(1):58–93, 2010.<br />

[56] M. J. Hinek and D. R. Stinson. An inequality about factors <strong>of</strong> multivariate<br />

polynomials. Technical report, Centre <strong>of</strong> Applied Cryptographic Research<br />

(CACR), University <strong>of</strong> Waterloo, 2006. Available at http://www.cacr.<br />

math.uwaterloo.ca/techreports/2006/cacr2006-15.pdf.<br />

[57] K. H<strong>of</strong>fman and R. Kunze. Linear Algebra. Prentice-Hall, 1971.<br />

[58] J. H<strong>of</strong>fstein, J. Pipher, and J. H. Silverman. NTRU: A ring-based public key<br />

cryptosystem. In Proceedings <strong>of</strong> ANTS’98, volume 1423 <strong>of</strong> Lecture Notes in<br />

Computer Science, pages 267–288, 1998.<br />

[59] N. Howgrave-Graham. Finding small roots <strong>of</strong> univariate modular equations<br />

revisited. In Proceedings <strong>of</strong> IMA International Conference on Cryptography<br />

and Coding, volume 1355 <strong>of</strong> Lecture Notes in Computer Science, pages 131–<br />

142, 1997.<br />

[60] N. Howgrave-Graham. Computational Mathematics Inspired by <strong>RSA</strong>. PhD<br />

thesis, University <strong>of</strong> Bath, 1998. Available at http://www.nickhg.com/<br />

cgi-bin/index.html.<br />

[61] N.Howgrave-Graham. Approximateintegercommondivisors. InProceedings<br />

<strong>of</strong> CaLC’01, volume 2146 <strong>of</strong> Lecture Notes in Computer Science, pages 51–<br />

66, 2001.<br />

[62] N. Howgrave-Graham and J.-P. Seifert. Extending Wiener’s attack in the<br />

presence <strong>of</strong> many decrypting exponents. In Proceedings <strong>of</strong> CQRE’99, volume<br />

1740 <strong>of</strong> Lecture Notes in Computer Science, pages 153–166, 1999.<br />

[63] K. Ireland and M. Rosen. A Classical Introduction to Modern Number Theory.<br />

Springer, 1990.<br />

[64] E.Jochemsz. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> variants using small roots <strong>of</strong> polynomials.<br />

PhDthesis, TechnischeUniversiteitEindhoven, Netherlands, 2007. Available<br />

at http://www.win.tue.nl/~bdeweger/studenten.html.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!