A generalized Wiener attack on RSA, Public Key Cryptography -PKC, vol.2947, pp.1-13, 2004. ,
Cryptanalysis of RSA with private key d less than N 0, Advances in Cryptology-Eurocrypt'99, vol.292, pp.1-11, 1999. ,
Factoring N = p r q for Large r, Proceedings of Crypto'99, vol.1666, pp.326-337, 1999. ,
, Cryptography using Compaq multiprime technology in a parallel processing environment, 2002.
Small solutions to polynomial equations, and low exponent RSA vulnerabilities, Journal of Cryptology, vol.10, issue.4, pp.233-260, 1997. ,
An Introduction to the Theory of Numbers, 1975. ,
Solving linear equations modulo divisors: On factoring given any bits, Advances in Cryptology-ASIACRYPT, pp.406-424, 2008. ,
Cryptanalysis of RSA and its variants. Chapman & Hall/CRC Cryptography and Network Security, 2010. ,
Factoring integers with elliptic curves, Annals of Mathematics, vol.126, pp.649-673, 1987. ,
, The Development of the Number Field Sieve, vol.1554, 1993.
, Factoring polynomials with rational coefficients, vol.261, pp.513-534, 1982.
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications, Cryptology ePrint Archive, vol.343, 2014. ,
, Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q. Public Key Cryptography-PKC 2004, vol.2947, pp.218-230, 2004.
Using LLL-reduction for solving RSA and factorization problems: a survey, LLL+25 Conference in Honour of the 25th Birthday of the LLL Algorithm, 2007. ,
A Method for Obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
Small secret exponent attack on RSA variant with modulus N = p r q, Designs, Codes and Cryptography, vol.73, pp.383-392, 2015. ,
Fast RSA-type cryptosystem modulo p k q, Advances in Cryptology-Crypto'98, pp.318-326, 1998. ,
Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol.36, pp.553-558, 1990. ,