Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
BIBLIOGRAPHY 164<br />
[76] A. K. Lenstra and H. W. Lenstra, Jr., editors. The Development <strong>of</strong> the<br />
Number Field Sieve, volume1554<strong>of</strong>Lecture Notes in Mathematics. Springer-<br />
Verlag, Berlin, 1993.<br />
[77] A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials<br />
with rational coefficients. Mathematische Annalen, 261:515–534, 1982.<br />
[78] A. K. Lenstra, H. W. Lenstra, Jr., M. S. Manasse, and J. M. Pollard. The<br />
factorization <strong>of</strong> the ninth Fermat number. Mathematics <strong>of</strong> Computation,<br />
61(203):319–349, 1993.<br />
[79] H. W. Lenstra, Jr. Factoring integers with elliptic curves. Annals <strong>of</strong> Mathematics,<br />
126:649–673, 1987.<br />
[80] F. Luca and P. Stănică. On the prime power factorization <strong>of</strong> n!. Journal <strong>of</strong><br />
Number Theory, 102/2:298–305, 2003.<br />
[81] S. Maitra and S. Sarkar. A new class <strong>of</strong> weak encryption exponents in <strong>RSA</strong>.<br />
In Proceedings <strong>of</strong> Indocrypt’08, volume 5365 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 337–349, 2008.<br />
[82] S. Maitra, S. Sarkar, and S. Sen Gupta. Factoring <strong>RSA</strong> modulus using prime<br />
reconstruction from random known bits. In Proceedings <strong>of</strong> Africacrypt’10,<br />
volume 6055 <strong>of</strong> Lecture Notes in Computer Science, pages 82–99, 2010.<br />
[83] A. May. New <strong>RSA</strong> Vulnerabilities Using Lattice Reduction Methods. PhD<br />
thesis, University <strong>of</strong> Paderborn, Germany, 2003. Available at http://www.<br />
cs.uni-paderborn.de/uploads/tx_sibibtex/bp.pdf.<br />
[84] A. May. Using LLL-reduction for solving <strong>RSA</strong> and factorization problems.<br />
Technical report, LLL+25 Conference in honour <strong>of</strong> the 25th birthday <strong>of</strong><br />
the LLL algorithm, Technische Universität Darmstadt, 2007. Available at<br />
http://www.informatik.tu-darmstadt.de/KP/alex.html.<br />
[85] A. May and M. Ritzenh<strong>of</strong>en. Solving systems <strong>of</strong> modular equations in one<br />
variable: How many <strong>RSA</strong>-encrypted messages does Eve need to know? In<br />
Proceedings <strong>of</strong> PKC’08, volume 4939 <strong>of</strong> Lecture Notes in Computer Science,<br />
pages 37–46, 2008.