On The Oracle Complexity Of Factoring Integers (1996)

Cached

Download Links

by Ueli M. Maurer
Venue:COMPUTATIONAL COMPLEXITY
Citations:5 - 0 self

Documents Related by Co-Citation

42 An attack on RSA given a small fraction of the private key bits – D Boneh, G Durfee, Y Frankel - 1998
48 A leakage-resilient mode of operation – Krzysztof Pietrzak - 2009
18 When private keys are public: results from the 2008 Debian OpenSSL vulnerability – S Yilek, E Rescorla, H Shacham, B Enright, S Savage
105 Least we remember: Cold boot attacks on encryption keys – J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Cal, Ariel J. Feldman, Edward W. Felten - 2008
74 Simultaneous hardcore bits and cryptography against memory attacks – Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan, Weizmann Insitute - 2009
23 E cient factoring based on partial information – Ronald L Rivest, Adi Shamir - 1985
19 On cryptography with auxiliary input – Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett - 2009
2 Cryptography without (hardly any) secrets – S Goldwasser - 2009
2 Fast variants of RSA. RSA Cryptobytes, 5(1):1–9, Winter/Spring 2002. 17 D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities – D Boneh, H Shacham - 1997
2 Cache missing for fun and profit. Online: http://www.daemonology.net/papers/ cachemissing.pdf – C Percival - 2005
3 Public key cryptography in the bounded retrieval model and security against side-channel attacks – J Alwen, Y Dodis, D Wichs - 2009
9 Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring – Jean-sébastien Coron - 2006
10 Adapting Density Attacks to Low-Weight Knapsacks – Phong Q. Nguy Ên, Jacques Stern
51 Public-Key Cryptosystems Resilient to Key Leakage – Moni Naor, Gil Segev
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
498 A Second Course in Stochastic Processes – S Karlin, H M Taylor - 1981
129 Twenty Years of Attacks on the RSA Cryptosystem – Dan Boneh - 1999
21 New RSA Vulnerabilities Using Lattice Reduction Methods – A May - 2003
16 Using LLL-Reduction for Solving RSA and Factorization Problems: A Survey – Alexander May - 2007