Low exponent attack against elliptic curve RSA (1995)

Cached

Download Links

by Kaoru Kurosawa , Koji Okada , Shigeo Tsujii
Citations:5 - 0 self

Active Bibliography

unknown title – Foreword Whitfield Diffie
1 Public Key Cryptosystems using Elliptic Curves – J. Borst - 1997
3 Cryptanalysis of RSA-Type Cryptosystems: A Visit – Marc Joye, Jean-Jacques Quisquater - 1998
9 On the importance of securing your bins: The garbage-man-in-the-middle attack – Marc Joye, Jean-Jacques Quisquater - 1997
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
A Survey of Elliptic Curve Cryptosystems, Part I: Introductory – San C. Vo - 2003
4 Protocol Failures for RSA-like Functions using Lucas Sequences and Elliptic Curves – Marc Joye, Jean-Jacques Quisquater - 1997
RSA Worldwide > > > ECC RSA Security Home RSA Laboratories Tech Notes Bulletins Challenges Crypto FAQ CryptoBytes RSA Algorithm PKCS Advanced Encryption Standard Tech Notes Staff Associates Standards – Elliptic Curve Cryptosystems, Yiqun Lisa Yin
A Public Key Cryptosystem Based On Pell – Equation Sahadeo Padhye, Sahadeo Padhye, Raipur (c. G. India - 2006
2 Faulty RSA encryption – M. Joye, M. Joye, J.-J. Quisquater, J. -j. Quisquater - 1997
Cryptanalysis of Koyama Scheme – Sahdeo Padhye - 2006
9 RSA-type Signatures in the Presence of Transient Faults – Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng - 1997
5 A New and Optimal Chosen-Message Attack on RSA-Type Cryptosystems – Daniel Bleichenbacher, Marc Joye, Jean-jacques Quisquater - 1997
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library – P S Avadhani
2 EPOC: Efficient Probabilistic Public-Key Encryption – Eiichiro Fujisaki, Tetsutaro Kobayashi, Hikaru Morita, Hiroaki Oguro, Tatsuaki Okamoto, Satomi Okazaki, David Pointcheval, Shigenori Uchiyama
To appear in Journal of Cryptology. Chinese Remaindering Based Cryptosystems in the Presence of Faults – Marc Joye, Arjen K. Lenstra, Jean-jacques Quisquater
27 Chinese Remaindering Based Cryptosystems in the Presence of Faults – Marc Joye, Arjen K. Lenstra, Jean-jacques Quisquater
Solving the generalized Pell equation x 2 − Dy 2 = N – unknown authors
FactInt Advanced Methods for Factoring Integers Version 1.5.2 – Stefan Kohl - 2007