Cryptanalysis of RSA with private key d less than N 0, Eurocrypt'99, vol.292, pp.1-11, 1999. ,
A new attack on three variants of the RSA cryptosystem, Proceedings of the 21st Australasian Conference on Information Security and Privacy, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02321009
, A new improved attack on RSA, Proceedings of the 5th International Cryptology and Information Security Conference, 2016.
An efficient probabilistic public-key cryptosystem over quadratic field quotients, Finite Fields and Their Applications, vol.13, pp.563-576, 2007. ,
Small solutions to polynomial equations, and low exponent RSA vulnerabilities, Journal of Cryptology, vol.10, pp.233-260, 1997. ,
Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian integers, Proceedings of the 8th International Conference on Communication Systems, pp.91-95, 2002. ,
An Introduction to the Theory of Numbers, 1965. ,
, New public-key schemes based on elliptic curves over the ring Zn, CRYPTO'91, vol.576, pp.252-266, 1991.
A new RSA-type scheme based on singular cubic curves y 2 = x 3 +bx 2 (mod n), IEICE Transactions on Fundamentals E78-A, pp.27-33, 1995. ,
Factoring integers with elliptic curves, Annals of Mathematics, vol.126, pp.649-673, 1987. ,
A Method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, pp.120-126, 1978. ,
Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol.36, pp.553-558, 1990. ,