, Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry, pp.31-1998
A generalized Wiener attack on RSA, Public Key Cryptography -PKC, vol.2947, pp.1-13, 2004. ,
Cryptanalysis of RSA with private key d less than N 0, Advances in Cryptology -Eurocrypt'99, vol.292, pp.1-11, 1999. ,
Small solutions to polynomial equations, and low exponent RSA vulnerabilities, Journal of Cryptology, vol.10, issue.4, pp.233-260, 1997. ,
On using RSA with low exponent in a public key network, Proceedings of CRYPTO'85, pp.403-408, 1986. ,
On the Security of Some Variants of RSA, 2007. ,
Finding small roots of univariate modular equations revisited, Cryptography and Coding, vol.1355, pp.131-142, 1997. ,
Extending Wieners attack in the presence of many decrypting exponents, Secure Networking-CQRE (Secure)'99, vol.1740, pp.153-166, 1999. ,
A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants, ASIACRYPT 2006, vol.4284, pp.267-282, 2006. ,
, Factoring polynomials with rational coefficients, vol.261, pp.513-534, 1982.
Cryptanalysis of RSA with two decryption exponents, Information Processing Letters, vol.110, pp.178-181, 2010. ,
New RSA Vulnerabilities Using Lattice Reduction Methods, 2003. ,
Another generalization of Wiener's attack on RSA, Africacrypt 2008, vol.5023, pp.174-190, 2008. ,
A Method for Obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
On the Security of RSA with Primes Sharing Least-Significant Bits, Appl. Algebra Eng. Commun. Comput, vol.15, issue.3-4, p.179200, 2004. ,
An advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits, CT-RSA 2001, vol.2020, pp.52-62, 2001. ,
On the Security of RSA with Primes Sharing Least-Significant Bits, Appl. Algebra Eng. Commun. Comput, vol.15, issue.3-4, pp.179-200, 2004. ,
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, CANS 2008, vol.5339, pp.49-63, 2008. ,
Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol.36, pp.553-558, 1990. ,
Small private-exponent attack on RSA with primes sharing bits, ISC 2007, vol.4779, pp.221-229, 2007. ,