Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
165 BIBLIOGRAPHY<br />
[86] A. May and M. Ritzenh<strong>of</strong>en. Implicit factoring: On polynomial time factoring<br />
given only an implicit hint. In Proceedings <strong>of</strong> PKC’09, volume 5443 <strong>of</strong><br />
Lecture Notes in Computer Science, pages 1–14, 2009.<br />
[87] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook <strong>of</strong> Applied<br />
Cryptography. CRC Press, 2001. Available at http://www.cacr.math.<br />
uwaterloo.ca/hac/.<br />
[88] R. C. Merkle and M. E. Hellman. Hiding information and signatures in<br />
trapdoor knapsacks. IEEE Transactions on Information Theory, 24:525–<br />
530, 1978.<br />
[89] D. Micciancio and S. Goldwasser. Complexity <strong>of</strong> Lattice Problems: A Cryptographic<br />
Perspective. Springer International Series in Engineering and Computer<br />
Science, 2002.<br />
[90] G. L. Miller. Riemann’s hypothesis and tests for primality. Journal <strong>of</strong><br />
Computer and System Sciences, 13(3):300–317, December 1976. (Invited<br />
publication).<br />
[91] V. S. Miller. Use <strong>of</strong> elliptic curves in cryptography. In Proceedings <strong>of</strong><br />
Crypto’85, volume 218 <strong>of</strong> Lecture Notes in Computer Science, pages 417–<br />
426, 1986.<br />
[92] H. Minkowski. Geometrie der Zahlen. Teubner Verlag, 1896.<br />
[93] P. Q. Nguyen and D. Stehlé. Floating-point LLL revisited. In Proceedings<br />
<strong>of</strong> Eurocrypt’05, volume 3494 <strong>of</strong> Lecture Notes in Computer Science, pages<br />
215–233, 2005.<br />
[94] P. Q. Nguyen and J. Stern. The two faces <strong>of</strong> lattices in cryptology. In<br />
Proceedings <strong>of</strong> CaLC’01, volume 2146 <strong>of</strong> Lecture Notes in Computer Science,<br />
pages 146–180, 2001.<br />
[95] P. Q. Nguyen and B. Vallée. The LLL Algorithm: Survey and Applications,<br />
chapter 2, pages 19–69. Information Security and Cryptography. Springer,<br />
2009.<br />
[96] A. Nitaj. Another generalization <strong>of</strong> Wiener’s attack on <strong>RSA</strong>. In Proceedings<br />
<strong>of</strong> Africacrypt’08, volume 5023 <strong>of</strong> Lecture Notes in Computer Science, pages<br />
174–190, 2008.