Cryptanalysis of RSA and Its Variants
CRC Press, 2009-07-21 - 272 psl.
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its main variants, includin
Ką žmonės sako - Rašyti recenziją
Neradome recenzijų įprastose vietose.
Cryptanalysis of RSA
Cryptanalysis of Variants of RSA
Kiti leidimai - Peržiūrėti viską
algebraically independent Assumptions 2.15 attacks on RSA balanced primes basis matrix basis vectors Blömer Boneh Boneh and Durfees Chinese remainder theorem ciphertext common factor common prime RSA Computer Science consider constant continued fraction corresponding private exponent Cryptanalysis cryptography cryptosystem Dual RSA Durfee editor enabling condition encryption exponent and let factor the modulus following holds Hinek Howgrave-Graham instances of RSA integer Jochemsz key equation key exposure attacks lattice least significant bits Lecture Notes modular equation modular exponentiations modulus with balanced multi-prime RSA multiple Notes in Computer number of primes partial key exposure plaintext polynomial in log(N private exponent attacks private exponent satisfies private key provided that Assumptions public key public-key cryptography RSA primes RSA problem sized public exponent small private exponent small public exponent smallest vector Springer Takagis scheme target vector valid public exponent variants of RSA volume Wieners attack