Author:
Ravva Santosh Kumar,Prakash K. L. N. C.,Krishna S. R. M.
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference40 articles.
1. Rivest, R.L., Shamir, A., Adleman, M.: A Method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
2. Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Trans. Inf. Theory 36, 553–558 (1990)
3. Boneh, D., Durfee, G.: Cryptanalysis of RSA with Private Key d Less than N^292. IEEE Trans. Inf. Theory 46(4), 1339–1349 (2000)
4. Blomer, J., May, A.: Low secret exponent RSA revisited. In: Silverman, J.H. (ed.) CaLC, Volume 2146 of Lecture Notes in Computer Science, pp. 4–19. Springer (2001)
5. De Weger, B.: Cryptanalysis of RSA with small prime difference. Appl. Algebra Eng. Commun. Comput. 13(1), 17–28 (2002)