References
- J. Blomer and A. May, A generalized Wiener attack on RSA, In Public Key Cryptography-PKC 2004, volume 2947 of Lecture Notes in Computer Science, pp. 1-13. Springer-Verlag, 2004.
- D. Boneh, Twenty years of attacks on the RSA cryptosystem, Notices Amer. Math. Soc. 46 (1999), no. 2, 203-213.
- D. Coppersmith, Small solutions to polynomial equations, and low exponent RSA vul-nerabilities, J. Cryptology 10 (1997), no. 4, 233-260. https://doi.org/10.1007/s001459900030
- G. H. Hardy and E. M. Wright, An Introduction to the Theory of Numbers, Oxford University Press, London, 1975.
- M. J. Hinek, Cryptanalysis of RSA and its Variants, Chapman & Hall/CRC Cryptography and Network Security, CRC Press, Boca Raton, FL, 2010.
- B. Ibrahimpasic, Cryptanalysis of KMOV cryptosystem with short secret exponent, Central European Conference on Information and Intelligent Systems, CECIIS, 2008.
-
K. Koyama, U. M. Maurer, T. Okamoto, and S. A. Vanstone, New public-key schemes based on elliptic curves over the ring
$\mathbb{Z}_n$ , Advances in Cryptology - Crypto'91, Lecture Notes in Computer Science, Vol. 576, 252-266, Springer-Verlag, 1991. - R. G. E. Pinch, Extending the Wiener attack to RSA-type cryptosystems, Electronics Letters 31 (1995), 1736-1738. https://doi.org/10.1049/el:19951199
- R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM 21 (1978), no. 2, 120-126. https://doi.org/10.1145/359340.359342
- J. H. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, GTM 106, 1986; Expanded 2nd Edition, 2009.
- M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory 36 (1990), no. 3, 553-558. https://doi.org/10.1109/18.54902
Cited by
- A new generalization of the KMOV cryptosystem 2017, https://doi.org/10.1007/s12190-017-1103-6