11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

165 BIBLIOGRAPHY<br />

[86] A. May and M. Ritzenh<strong>of</strong>en. Implicit factoring: On polynomial time factoring<br />

given only an implicit hint. In Proceedings <strong>of</strong> PKC’09, volume 5443 <strong>of</strong><br />

Lecture Notes in Computer Science, pages 1–14, 2009.<br />

[87] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook <strong>of</strong> Applied<br />

Cryptography. CRC Press, 2001. Available at http://www.cacr.math.<br />

uwaterloo.ca/hac/.<br />

[88] R. C. Merkle and M. E. Hellman. Hiding information and signatures in<br />

trapdoor knapsacks. IEEE Transactions on Information Theory, 24:525–<br />

530, 1978.<br />

[89] D. Micciancio and S. Goldwasser. Complexity <strong>of</strong> Lattice Problems: A Cryptographic<br />

Perspective. Springer International Series in Engineering and Computer<br />

Science, 2002.<br />

[90] G. L. Miller. Riemann’s hypothesis and tests for primality. Journal <strong>of</strong><br />

Computer and System Sciences, 13(3):300–317, December 1976. (Invited<br />

publication).<br />

[91] V. S. Miller. Use <strong>of</strong> elliptic curves in cryptography. In Proceedings <strong>of</strong><br />

Crypto’85, volume 218 <strong>of</strong> Lecture Notes in Computer Science, pages 417–<br />

426, 1986.<br />

[92] H. Minkowski. Geometrie der Zahlen. Teubner Verlag, 1896.<br />

[93] P. Q. Nguyen and D. Stehlé. Floating-point LLL revisited. In Proceedings<br />

<strong>of</strong> Eurocrypt’05, volume 3494 <strong>of</strong> Lecture Notes in Computer Science, pages<br />

215–233, 2005.<br />

[94] P. Q. Nguyen and J. Stern. The two faces <strong>of</strong> lattices in cryptology. In<br />

Proceedings <strong>of</strong> CaLC’01, volume 2146 <strong>of</strong> Lecture Notes in Computer Science,<br />

pages 146–180, 2001.<br />

[95] P. Q. Nguyen and B. Vallée. The LLL Algorithm: Survey and Applications,<br />

chapter 2, pages 19–69. Information Security and Cryptography. Springer,<br />

2009.<br />

[96] A. Nitaj. Another generalization <strong>of</strong> Wiener’s attack on <strong>RSA</strong>. In Proceedings<br />

<strong>of</strong> Africacrypt’08, volume 5023 <strong>of</strong> Lecture Notes in Computer Science, pages<br />

174–190, 2008.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!