11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

167 BIBLIOGRAPHY<br />

[108] R. L. Rivest. The RC4 encryption algorithm. <strong>RSA</strong> Data Security, Inc., 1992.<br />

[109] R. L. Rivest and A. Shamir. Efficient factoring based on partial information.<br />

In Proceedings <strong>of</strong> Eurocrypt’85, volume 219 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 31–34, 1986.<br />

[110] R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining<br />

digital signatures and public-key cryptosystems. Communications <strong>of</strong> the<br />

Association for Computing Machinery, 21(2):120–126, 1978.<br />

[111] G. G. Rose and P. Hawkes. Turing: A fast stream cipher. In Proceedings <strong>of</strong><br />

FSE’03, volume 2887 <strong>of</strong> Lecture Notes in Computer Science, pages 290–306,<br />

2003.<br />

[112] S. Sarkar and S. Maitra. Approximate integer common divisor problem<br />

relates to implicit factorization. To appear in IEEE Transactions on Information<br />

Theory (accepted on 12th December, 2010).<br />

[113] S. Sarkar and S. Maitra. Further results on implicit factoring in polynomial<br />

time. Advances in Mathematics <strong>of</strong> Communications, 3(2):205–217, 2009.<br />

[114] S. Sarkar and S. Maitra. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with more than one decryption<br />

exponent. Information Processing Letters, 110(8-9):336–340, 2010.<br />

[115] S. Sarkar and S. Maitra. <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with two decryption exponents.<br />

Information Processing Letters, 110(5):178–181, 2010.<br />

[116] S. Sarkar and S. Maitra. Some applications <strong>of</strong> lattice based root finding techniques.<br />

Advances in Mathematics <strong>of</strong> Communications, 4(4):519–531, 2010.<br />

[117] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-<br />

Hellman cryptosystem. In Proceedings <strong>of</strong> Crypto’82, pages 279–288, 1982.<br />

[118] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-<br />

Hellman cryptosystem. In Proceedings <strong>of</strong> FOCS’82, pages 145–152, 1982.<br />

[119] P. W. Shor. Algorithms for quantum computation: Discrete logarithms and<br />

factoring. In Proceedings <strong>of</strong> FOCS’94, pages 124–134, 1994.<br />

[120] P. W. Shor. Polynomial-time algorithms for prime factorization and discrete<br />

logarithms on a quantum computer. SIAM Journal on Computing,<br />

26(5):1484–1509, 1997.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!