完整後設資料紀錄
DC 欄位語言
dc.contributor.authorSun, Hung-Min
dc.contributor.authorWu, Mu-En
dc.contributor.authorChen, Shiuan-Tung
dc.date.accessioned2009-08-23T04:43:00Z
dc.date.accessioned2020-05-25T06:51:25Z-
dc.date.available2009-08-23T04:43:00Z
dc.date.available2020-05-25T06:51:25Z-
dc.date.issued2007-01-29T08:40:54Z
dc.date.submitted2006-12-04
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/3608-
dc.description.abstractIn 1999, Wiener took advantage of continued fraction technique to attack short secret-exponent RSA, which is called the Wiener attack. This attack is the rst proof to show that we can not choose too short secret-exponent d when using RSA. The secret- exponent d should be chosen larger than N0:25. After then, in 1997, Verheul and Tilborg proposed an extension of the Wiener attack which can work well over Wiener's boundary. Suppose r = log(d=N0:25), their technique costs an exhaustive search for 2r+8 bits in order to attack d which is smaller than N0:252r. In this paper, we provide a simpler method to demonstrate a result which is similar to Verheul and Tilborg's . With our method it only costs an exhaustive search for 2r + 2 bits, which is 6-bit fewer than Verheul and Tilborg's 2r + 8 bits
dc.description.sponsorship元智大學,中壢市
dc.format.extent5p.
dc.format.extent496191 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2006 ICS會議
dc.subject.otherAuthentication and Digital Signatures
dc.titleOn the Extension of Wiener Attack on RSA with Short Secret-Exponents
分類:2006年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002006000154.pdf484.56 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。