透過您的圖書館登入
IP:18.224.39.74
  • 學位論文

RSA金鑰產生器之後門研究

The Research of Backdoors for RSA Key Generation

指導教授 : 孫宏民
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


無資料

並列摘要


無資料

並列關鍵字

RSA SETUP backdoor lattice reduction Diffie-Hellman elliptic curve

參考文獻


[1] R. J. Anderson, “A practical RSA trapdoor,” Electronic Letters, vol. 29, no. 11, p. 995, 1993.
[3] D. Boneh and G. Durfee, “Cryptanalysis of RSA with private key d less than n0.292,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1339-1349, 2000.
[4] D. Boneh, G. Durfee, and Y. Frankel, “An attack on RSA given a small fraction of the private key bits,” Advances in Cryptology–ASIACRYPT ’98 (Lecture Notes in Computer Science). Berlin Germany: Springer-Verlag, vol. 1514, pp. 25-34, 1998.
[5] D. Boneh and R. Venkatesan, “Breaking RSA may not be equivalent to factoring,” Advances in Cryptology–EUROCRYPT '98 (Lecture Notes in Computer Science). Berlin Germany: Springer-Verlag, vol. 1233, pp. 59-71, 1998.
[6] D. Coppersmith, “Finding a small root of a bivariate integer equation: factoring with high bits known,” Advances in Cryptology–EUROCRYPT ’96 (Lecture Notes in Computer Science). Berlin Germany: Springer-Verlag, vol. 1070, pp. 178-189, 1996.

延伸閱讀