Sciweavers

3 search results - page 1 / 1
» Maximizing Small Root Bounds by Linearization and Applicatio...
Sort
View
PKC
2010
Springer
138views Cryptology» more  PKC 2010»
13 years 8 months ago
Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
We present an elementary method to construct optimized lattices that are used for finding small roots of polynomial equations. Former methods first construct some large lattice i...
Mathias Herrmann, Alexander May
PKC
2005
Springer
144views Cryptology» more  PKC 2005»
13 years 9 months ago
RSA with Balanced Short Exponents and Its Application to Entity Authentication
In typical RSA, it is impossible to create a key pair (e, d) such that both are simultaneously much shorter than φ(N). This is because if d is selected first, then e will be of t...
Hung-Min Sun, Cheng-Ta Yang
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
13 years 9 months ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May