Bach, E., Peralta, R.: Asymptotic semismoothness probabilities. Mathematics of Computation 65(216), 1701–1715 (1996)
MathSciNet
CrossRef
MATH
Google Scholar
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of CCS 1993, pp. 62–73. ACM, New York (1993)
Google Scholar
Bellare, M., Rogaway, P.: Optimal Asymmetric Encryption: How to encrypt with RSA. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92–111. Springer, Heidelberg (1995)
CrossRef
Google Scholar
Bellare, M., Rogaway, P.: The Exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)
CrossRef
Google Scholar
Bernstein, D.J.: Fast Multiplications and its applications. Algorithmic Number Theory 44 (2008)
Google Scholar
Bernstein, D.J.: How to find smooth parts of integers (2004/05/10),
http://cr.yp.to/papers.html#smoothparts
Bernstein, D.J.: Scaled remainder trees (2004/08/20),
http://cr.yp.to/papers.html#scaledmod
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998)
CrossRef
Google Scholar
Coppersmith, D.: Solving homogeneous linear equations over GF(2) via block Wiedemann algorithm. Mathematics of Computation 62(205), 333–350 (1994)
MathSciNet
MATH
Google Scholar
Coppersmith, D., Coron, J.-S., Grieu, F., Halevi, S., Jutla, C.S., Naccache, D., Stern, J.P.: Cryptanalysis of iso/iec 9796-1. Journal of Cryptology 21, 27–51 (2008)
MathSciNet
CrossRef
MATH
Google Scholar
Coppersmith, D., Halevi, S., Jutla, C.: iso 9796-1 and the new, forgery strategy, Research contribution to P.1363 (1999),
grouper.ieee.org/groups/1363/Research
Coron, J.S., Naccache, D., Tibouchi, M., Weinmann, R.P.: Practical Cryptanalysis of ISO / IEC 9796-2 and EMV Signatures, Cryptology ePrint Archive, Report 2009/203,
http://eprint.iacr.org/
Coron, J.-S.: Security proofs for partial domain hash signature schemes. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 613–626. Springer, Heidelberg (2002)
CrossRef
Google Scholar
Coron, J.-S., Desmedt, Y., Naccache, D., Odlyzko, A., Stern, J.P.: Index calculation attacks on RSA signature and encryption. Index calculation attacks on RSA signature and encryption Designs, Codes and Cryptography 38(1), 41–53 (2006)
MathSciNet
CrossRef
MATH
Google Scholar
Coron, J.-S., Naccache, D., Joye, M., Paillier, P.: New attacks on pkcs#1 v1.5 encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 369–381. Springer, Heidelberg (2000)
CrossRef
Google Scholar
Coron, J.-S., Naccache, D., Stern, J.P.: On the security of RSA padding. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 1–18. Springer, Heidelberg (1999)
CrossRef
Google Scholar
Desmedt, Y., Odlyzko, A.: A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 516–522. Springer, Heidelberg (1986)
Google Scholar
EMV, Integrated circuit card specifications for payment systems, Book 2. Security and Key Management. Version 4.2 (June 2008),
http://www.emvco.com
Gaudry, P., Kruppa, A., Zimmermann, P.: A gmp-based implementation of Schőnhage-Strassen’s large integer multiplication algorithm. In: Proceedings of issac 2007, Waterloo, Ontario, Canada, pp. 167–174. ACM Press, New York (2007)
Google Scholar
Grieu, F.: A chosen messages attack on the iso/iec 9796-1 signature scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 70–80. Springer, Heidelberg (2000)
CrossRef
Google Scholar
Hart, W.B., et al.: Multiple Precision Integers and Rationals,
http://www.mpir.org
ISO / IEC 9796, Information technology – Security techniques – Digital signature scheme giving message recovery, Part 1: Mechanisms using redundancy (1999)
Google Scholar
ISO / IEC 9796-2, Information technology – Security techniques – Digital signature scheme giving message recovery, Part 2: Mechanisms using a hash-function (1997)
Google Scholar
ISO / IEC 9796-2:2002, Information technology – Security techniques – Digital signature schemes giving message recovery – Part 2: Integer factorization based mechanisms (2002)
Google Scholar
Joux, A., Naccache, D., Thomé, E.: When e-th roots become easier than factoring. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 13–28. Springer, Heidelberg (2007)
CrossRef
Google Scholar
Kaliski, B.: pkcs#1: RSA Encryption Standard, Version 1.5, RSA Laboratories (November 1993)
Google Scholar
Kaltofen, E., Lobo, A.: Distributed matrix-free solution of large sparse linear systems over finite fields. Algorithmica 24, 331–348 (1999)
MathSciNet
CrossRef
MATH
Google Scholar
Lenstra, A.K., Lenstra Jr., H.W., Lovász, L.: Factoring polynomials with rational coefficients. Mathematische Annalen 261, 513–534 (1982)
MathSciNet
CrossRef
MATH
Google Scholar
Lenstra Jr., H.: Factoring integers with elliptic curves. Annals of Mathematics 126(2), 649–673 (1987)
MathSciNet
CrossRef
MATH
Google Scholar
Lobo, A.: wlss2: an implementation of the homogeneous block Wiedemann algorithm,
www4.ncsu.edu/~kaltofen/software/wiliss
Misarsky, J.-F.: How (not) to design RSA signature schemes. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 14–28. Springer, Heidelberg (1998)
CrossRef
Google Scholar
Paar, C., Schimmer, M.: copacobana: A Codebreaker for des and other ciphers,
www.copacobana.org
The PARI Group, PARI/GP, version 2.3.4, Bordeaux (2008),
http://pari.math.u-bordeaux.fr
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the acm 21, 120–126 (1978)
MathSciNet
CrossRef
MATH
Google Scholar
The sage development team, sage mathematics software, Version 3.3 (2009),
http://www.sagemath.org