Toward a rigorous variation of Coppersmith's algorithm on three variables, Proceedings of Eurocrypt'07, vol.4515, pp.361-378, 2007. ,
A generalized Wiener attack on RSA, Public Key Cryptography -PKC, vol.2947, pp.1-13, 2004. ,
Cryptanalysis of RSA with private key d less than N 0, Advances in Cryptology-Eurocrypt'99, vol.292, pp.1-11, 1999. ,
Small solutions to polynomial equations, and low exponent RSA vulnerabilities, Journal of Cryptology, vol.10, issue.4, pp.233-260, 1997. ,
A new elliptic curve based analogue of RSA, EUROCRYPT 1993, vol.765, pp.40-49, 1994. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, pp.644-654, 1976. ,
A public key cryptosystem and signature scheme based on discrete logarithms, IEEE Transactions on Information Theory IT, vol.31, pp.496-473, 1985. ,
New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks, Journal of Information and Optimization Sciences, vol.38, issue.2, pp.341-365, 2017. ,
A polynomial time, numerically stable integer relation algorithm, 1991. ,
An Introduction to the Theory of Numbers, 1975. ,
On the number of positive integers ? x and free of prime factors ?, J. Number Theory, vol.22, pp.289-307, 1986. ,
Cryptanalysis of RSA and its variants. Chapman & Hall/CRC Cryptography and Network Security, 2010. ,
Finding small roots of univariate modular equations revisited, Cryptography and Coding, vol.1355, pp.131-142, 1997. ,
The Theta model of Elliptic Curve, Mediterr. J. Math, vol.14, p.65, 2017. ,
Parallelizing pairings on Hessian elliptic curves, Arab Journal of Mathematical Sciences, vol.25, issue.1, 2019. ,
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, pp.203-209, 1987. ,
Low exponent attack against elliptic curve RSA, Low exponent attack against elliptic curve RSA, Inform. Process. Lett, vol.53, issue.2, p.7783, 1995. ,
Factoring integers with elliptic curves, Annals of Mathematics, vol.126, pp.649-673, 1987. ,
, Factoring polynomials with rational coefficients, vol.261, pp.513-534, 1982.
, The Development of the Number Field Sieve, vol.1554, 1993.
, New RSA Vulnerabilities using Lattics Reduction Methods, 2003.
Using LLL-reduction for solving RSA and factorization problems: a survey, LLL+25 Conference in Honour of the 25th Birthday of the LLL Algorithm, 2007. ,
Use of elliptic curves in cryptography, Cryptology -CRYPTO'85, vol.218, pp.417-426, 1986. ,
Another generalization of Wiener's attack on RSA, Lecture Notes in Computer Science, vol.5023, pp.174-190, 2008. ,
A Method for Obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
Counting points on elliptic curves over finite fields, Journal de Théorie des Nombres de Bordeaux, vol.7, issue.1, p.219254, 1995. ,
The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics, vol.106, 1986. ,
Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol.36, pp.553-558, 1990. ,