Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
167 BIBLIOGRAPHY<br />
[108] R. L. Rivest. The RC4 encryption algorithm. <strong>RSA</strong> Data Security, Inc., 1992.<br />
[109] R. L. Rivest and A. Shamir. Efficient factoring based on partial information.<br />
In Proceedings <strong>of</strong> Eurocrypt’85, volume 219 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 31–34, 1986.<br />
[110] R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining<br />
digital signatures and public-key cryptosystems. Communications <strong>of</strong> the<br />
Association for Computing Machinery, 21(2):120–126, 1978.<br />
[111] G. G. Rose and P. Hawkes. Turing: A fast stream cipher. In Proceedings <strong>of</strong><br />
FSE’03, volume 2887 <strong>of</strong> Lecture Notes in Computer Science, pages 290–306,<br />
2003.<br />
[112] S. Sarkar and S. Maitra. Approximate integer common divisor problem<br />
relates to implicit factorization. To appear in IEEE Transactions on Information<br />
Theory (accepted on 12th December, 2010).<br />
[113] S. Sarkar and S. Maitra. Further results on implicit factoring in polynomial<br />
time. Advances in Mathematics <strong>of</strong> Communications, 3(2):205–217, 2009.<br />
[114] S. Sarkar and S. Maitra. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with more than one decryption<br />
exponent. Information Processing Letters, 110(8-9):336–340, 2010.<br />
[115] S. Sarkar and S. Maitra. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with two decryption exponents.<br />
Information Processing Letters, 110(5):178–181, 2010.<br />
[116] S. Sarkar and S. Maitra. Some applications <strong>of</strong> lattice based root finding techniques.<br />
Advances in Mathematics <strong>of</strong> Communications, 4(4):519–531, 2010.<br />
[117] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-<br />
Hellman cryptosystem. In Proceedings <strong>of</strong> Crypto’82, pages 279–288, 1982.<br />
[118] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-<br />
Hellman cryptosystem. In Proceedings <strong>of</strong> FOCS’82, pages 145–152, 1982.<br />
[119] P. W. Shor. Algorithms for quantum computation: Discrete logarithms and<br />
factoring. In Proceedings <strong>of</strong> FOCS’94, pages 124–134, 1994.<br />
[120] P. W. Shor. Polynomial-time algorithms for prime factorization and discrete<br />
logarithms on a quantum computer. SIAM Journal on Computing,<br />
26(5):1484–1509, 1997.