D. Coppersmith, S. Halevi, C. Jutla, ISO 9796-1 and the new forgery strategy, Research contribution to P1363, 1999. Available at http://grouper.ieee.org/groups/1363/contrib.html.
J.S. Coron, D. Naccache, J.P. Stern, On the security of RSA padding, in Proceedings of Crypto ’99. Lecture Notes in Computer Science, vol. 1666 (Springer, Berlin, 1999), pp. 1–18.
Google Scholar
Y. Desmedt, A. Odlyzko, A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes, in Proceedings of Crypto ’85. Lecture Notes in Computer Science, vol. 218 (Springer, Berlin, 1985), pp. 516–522.
Google Scholar
K. Dickman, On the frequency of numbers containing prime factors of a certain relative magnitude. Ark. Mat. Astron. Fys.
22A(10), 1–14 (1930).
Google Scholar
S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput.
17(2), 281–308 (1988).
MATH
Article
MathSciNet
Google Scholar
F. Grieu, A chosen message attack on the ISO/IEC 9796-1 signature scheme, in Advances in Cryptology—Eurocrypt 2000. Lecture Notes in Computer Science, vol. 1807 (Springer, Berlin, 2000), pp. 70–80.
Chapter
Google Scholar
L. Guillou, J.-J. Quisquater, M. Walker, P. Landrock, C. Shaer, Precautions taken against various attacks in ISO/IEC DIS 9796, in Proceedings of Eurocrypt’ 90. Lecture Notes in Computer Science, vol. 473 (Springer, Berlin, 1990), pp. 465–473.
Google Scholar
ISO/IEC 9796, Information Technology—Security Techniques—Digital Signature Scheme Giving Message Recovery, Part 1: Mechanisms Using Redundancy, 1991.
C. Lanczos, An iterative method for the solution of the eigenvalue problem of linear differential and integral operator. J. Res. Nat. Bur. Standards
45, 255–282 (1950).
MathSciNet
Google Scholar
H.W. Lenstra Jr., Factoring integers with elliptic curves. Ann. Math.
126(2), 649–673 (1987).
MathSciNet
Article
Google Scholar
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography (CRC Press, Boca Raton, 1996).
Google Scholar
J.-F. Misarsky, How (not) to design RSA signature schemes, in Public-Key Cryptography. Lecture Notes in Computer Science, vol. 1431 (Springer, Berlin, 1998), pp. 14–28.
Chapter
Google Scholar
R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems. Commun. ACM
21, 120–126 (1978).
MATH
Article
MathSciNet
Google Scholar
V. Shoup, Number Theory C++ Library (NTL) version 5.3.1. Available at www.shoup.net.
D. Stinson, Cryptography: Theory and Practice (CRC Press, Boca Raton, 1995).
MATH
Google Scholar