Low exponent attack against elliptic curve RSA (1995)

Cached

Download Links

by Kaoru Kurosawa , Koji Okada , Shigeo Tsujii
Citations:5 - 0 self

Documents Related by Co-Citation

284 Elliptic curve public key cryptosystems – A Menezes - 1993
689 Elliptic curve cryptosystems – N Koblitz - 1987
1107 A public key cryptosystem and a signature scheme based on discrete logarithms – T ElGamal - 1985
526 Uses of Elliptic Curves in Cryptography – V Miller - 1986
46 New Public-Key Schemes Based on Elliptic Curves over the Ring Z_n – Kenji Koyama, Ueli M Maurer, Tatsuaki Okamoto, Scott A Vanstone - 1991
2890 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
2689 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
37 A New Elliptic Curve Based Analogue of RSA – N Demytko - 1994
816 The arithmetic of elliptic curves – J H Silverman - 1986
71 A modification of the RSA public-key encryption procedure – Hugh C Williams - 1980
1170 Probabilistic encryption – S Goldwasser, S Micali - 1984
10 A new RSA-type scheme based on singular cubic curves y 2 ≡ x 3 +bx 2 ( mod n – H Kuwakado, K Koyama, Y Tsuruoka - 1995
25 On the Security of the KMOV Public Key Cryptosystem – D. Bleichenbacher
3 Security of RSA-type cryptosystems over elliptic curves against H˚astad attack – H Kuwakado, K Koyama - 1994
38 On Using RSA with Low Exponent in a Public Key Network – J H˚astad - 1986
187 Speeding the Pollard and Elliptic Curve Methods of Factorization – P L Montgomery - 1987
78 Low-exponent RSA with related messages – Matthew Franklin, Jacques Patarin, Michael Reitert - 1996
140 Cryptanalysis of short RSA secret exponents – Michael J. Wiener - 1990
170 Elliptic curves over finite fields and the computation of square roots mod p – R Schoof - 1985