11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY 164<br />

[76] A. K. Lenstra and H. W. Lenstra, Jr., editors. The Development <strong>of</strong> the<br />

Number Field Sieve, volume1554<strong>of</strong>Lecture Notes in Mathematics. Springer-<br />

Verlag, Berlin, 1993.<br />

[77] A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials<br />

with rational coefficients. Mathematische Annalen, 261:515–534, 1982.<br />

[78] A. K. Lenstra, H. W. Lenstra, Jr., M. S. Manasse, and J. M. Pollard. The<br />

factorization <strong>of</strong> the ninth Fermat number. Mathematics <strong>of</strong> Computation,<br />

61(203):319–349, 1993.<br />

[79] H. W. Lenstra, Jr. Factoring integers with elliptic curves. Annals <strong>of</strong> Mathematics,<br />

126:649–673, 1987.<br />

[80] F. Luca and P. Stănică. On the prime power factorization <strong>of</strong> n!. Journal <strong>of</strong><br />

Number Theory, 102/2:298–305, 2003.<br />

[81] S. Maitra and S. Sarkar. A new class <strong>of</strong> weak encryption exponents in <strong>RSA</strong>.<br />

In Proceedings <strong>of</strong> Indocrypt’08, volume 5365 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 337–349, 2008.<br />

[82] S. Maitra, S. Sarkar, and S. Sen Gupta. Factoring <strong>RSA</strong> modulus using prime<br />

reconstruction from random known bits. In Proceedings <strong>of</strong> Africacrypt’10,<br />

volume 6055 <strong>of</strong> Lecture Notes in Computer Science, pages 82–99, 2010.<br />

[83] A. May. New <strong>RSA</strong> Vulnerabilities Using Lattice Reduction Methods. PhD<br />

thesis, University <strong>of</strong> Paderborn, Germany, 2003. Available at http://www.<br />

cs.uni-paderborn.de/uploads/tx_sibibtex/bp.pdf.<br />

[84] A. May. Using LLL-reduction for solving <strong>RSA</strong> and factorization problems.<br />

Technical report, LLL+25 Conference in honour <strong>of</strong> the 25th birthday <strong>of</strong><br />

the LLL algorithm, Technische Universität Darmstadt, 2007. Available at<br />

http://www.informatik.tu-darmstadt.de/KP/alex.html.<br />

[85] A. May and M. Ritzenh<strong>of</strong>en. Solving systems <strong>of</strong> modular equations in one<br />

variable: How many <strong>RSA</strong>-encrypted messages does Eve need to know? In<br />

Proceedings <strong>of</strong> PKC’08, volume 4939 <strong>of</strong> Lecture Notes in Computer Science,<br />

pages 37–46, 2008.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!