View : 551 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author이향숙-
dc.date.accessioned2016-08-28T11:08:12Z-
dc.date.available2016-08-28T11:08:12Z-
dc.date.issued2003-
dc.identifier.issn0096-3003-
dc.identifier.otherOAK-1313-
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/219136-
dc.description.abstractAt Asiacrypt '99, Sun, Yang and Laih proposed three different schemes of RSA cryptosystem to avoid all known attacks including Boneh-Durfee attack. One year after, Durfee and Nguyen attacked two out of these three schemes based on Coppersmith's lattice technique for finding small roots to trivariate modular polynomial equations. The bounds of private key for the first and third schemes were much improved, but the bound of the second scheme was not good enough. Our result improves Durfee and Nguyen's bound of the private exponent d from N 0.483 to N 0.486 for the second scheme. This implies the system is insecure if the private exponent d<N 0.486. © 2002 Elsevier Science Inc. All rights reserved.-
dc.languageEnglish-
dc.titleThe better bound of private key in RSA with unbalanced primes-
dc.typeArticle-
dc.relation.issue2-3-
dc.relation.volume139-
dc.relation.indexSCIE-
dc.relation.indexSCOPUS-
dc.relation.startpage351-
dc.relation.lastpage362-
dc.relation.journaltitleApplied Mathematics and Computation-
dc.identifier.doi10.1016/S0096-3003(02)00198-4-
dc.identifier.wosidWOS:000180511400012-
dc.identifier.scopusid2-s2.0-0037448163-
dc.author.googleHong H.-S.-
dc.author.googleLee H.-K.-
dc.author.googleLee H.-S.-
dc.author.googleLee H.-J.-
dc.contributor.scopusid이향숙(34870017000)-
dc.date.modifydate20230411110859-
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE