@inproceedings{Desmedt&Odlyzko:1985, key = "Desmedt and Odlyzko 1985", author = "Y. Desmedt and A. M. Odlyzko", title = "A chosen text attack on the {RSA} cryptosystem and some discrete logarithm schemes", booktitle = CRYPTO85, year = 1985, series = LNICS, editor = "H. C. Williams", volume = 218, pages = "516-522"} @article{Quisquater&Couvreur:1982, key = "Quisquater and Couvreur 1982", author = "J.-J. Quisquater and C. C. Couvreur", title = "Fast decipherment algorithm for {RSA} public-key cryptosystem", journal = ELETT, volume = 18, year = 1982, pages = "905-907"} @article{Williams&Schmid:1979, key = "H. Williams and Schmid 1979", author = "H. C. Williams and B. Schmid", title = "Some remarks concerning the {M.I.T.} public-key cryptosystem", journal = BIT, volume = 19, year = 1979, pages = "525-538"} @article{Rivest:1979, key = "Rivest 1979", author = "R. L. Rivest", title = {Critical remarks on {``Critical} remarks on some public-key cryptosystems" by {T. Herlestam}}, journal = BIT, volume = 19, year = 1979, pages = "274-275"} @inproceedings{Rivest:1984, key = "Rivest 1984", author = "R. L. Rivest", title = "{RSA} chips (past/present/future)", booktitle = EUROCRYPT84, series = LNICS, editor = "T. Beth and N. Cot and I. Ingemarsson", volume = 209, year = 1984, publisher = SV, pages = "159-165"} @article{Gordon:1985b, key = "J. Gordon 1985b", author = "J. A. Gordon", title = "How to forge {RSA} key certificates", journal = ELETT, volume = 21, year = "{\noopsort{1985b}}1985", pages = "377-379"} @article{Kurosawa&Matsu:1989, key = "Kurosawa and Matsu 1989", author = "K. Kurosawa and K. Matsu", title = "{$M$ mod $3$} security of {RSA}", journal = ELETT, volume = 25, year = 1989, pages = "445-446"} @article{GordonJ:1984b, key = "J. Gordon 1984b", author = "J. A. Gordon", title = "Strong {RSA} keys", journal = ELETT, volume = 20, year = "{\noopsort{1984b}}1984", pages = "514-516"} @article{Mohan&Adiga:1985, key = "Mohan and Adiga 1985", author = "S. B. Mohan and B. S. Adiga", title = "Fast algorithms for implementing {RSA} public key cryptosystem", journal = ELETT, volume = 21, year = 1985, pages = "761"} @article{Blakley&Borosh:1979, key = "Blakley and Borosh 1979", author = "G. R. Blakley and I. Borosh", title = "{Rivest-Shamir-Adleman} public key cryptosystems do not always conceal messages", journal = CMA, volume = 5, year = 1979, pages = "169-178"} @incollection{Sedlak:1987, key = "Sedlak 1987", author = "H. Sedlak", title = "The {RSA} cryptography processor", booktitle = EUROCRYPT87, publisher = SV, series = LNICS, volume = 304, editor = "D. Chaum and W. L. Price", year = 1987, pages = "95-105"} @incollection{Kochanski:1985, key = "Kochanski 1985", author = "M. Kochanski", title = "Developing an {RSA} chip", booktitle = CRYPTO85, publisher = SV, series = LNICS, volume = 218, editor = "H. C. Williams", year = 1985, pages = "350-357"} @incollection{Hastad:1985, key = "Hastad 1985", author = "J. Hastad", title = "On using {RSA} with low exponent in a public key network", booktitle = CRYPTO85, publisher = SV, series = LNICS, volume = 218, editor = "H. C. Williams", year = 1985, pages = "403-408"} @incollection{Barrett:1986, key = "Barrett 1986", author = "P. Barrett", title = "Implementing the {Rivest Shamir and Adleman} public key encryption algorithm on a standard digital signal processor", booktitle = CRYPTO86, publisher = SV, series = LNICS, volume = 263, editor = "A. M. Odlyzko", year = 1986, pages = "311-323"} @incollection{Rankine:1986, key = "Rankine 1986", author = "G. Rankine", title = "{THOMAS} -- a complete single chip {RSA} device", booktitle = CRYPTO86, publisher = SV, series = LNICS, volume = 263, editor = "A. M. Odlyzko", year = 1986, pages = "480-487"} @incollection{deJonge&Chaum:1986, key = "de Jonge and Chaum 1986", author = "Jonge, W. de and D. Chaum", title = "Some variations on {RSA} signatures and their security", booktitle = CRYPTO86, publisher = SV, series = LNICS, volume = 263, editor = "A. M. Odlyzko", year = 1986, pages = "49-59"} @incollection{deJonge&Chaum:1985, key = "de Jonge and Chaum 1985", author = "Jonge, W. de and D. Chaum", title = "Attacks on some {RSA} signatures", booktitle = CRYPTO85, publisher = SV, series = LNICS, volume = 218, editor = "H. C. Williams", year = 1985, pages = "18-27"} @incollection{Rivest:1982, key = "Rivest 1982", author = "R. L. Rivest", title = "A short report on the {RSA} chip", booktitle = CRYPTO82, publisher = "Plenum Press", year = 1982, pages = "327"} @inproceedings{Miyaguchi:1982, key = "Miyaguchi 1982", author = "S. Miyaguchi", title = "Fast encryption algorithm for the {RSA} cryptographic system", booktitle = "Proc. Computer Networks {COMPCON 82}", publisher = "IEEE", year = 1982, pages = "672-678"} @article{Rivest:1980a, key = "Rivest 1980a", author = "R. L. Rivest", title = "A description of a single-chip implementation of the {RSA} cipher", journal = "Lambda", volume = 1, number = 3, year = "{\noopsort{1980a}}4th quarter 1980", pages = "14-18"} @incollection{Rivest:1980b, key = "Rivest 1980b", author = "R. L. Rivest", title = "A description of a single-chip implementation of the {RSA} public-key cryptosystem", booktitle = "Conference Record, National Telecommunications Conference (NTC - 1980)", publisher = "IEEE", year = "{\noopsort{1980b}}1980", pages = "49.2.1-5"} @inproceedings{Orton&Peppard&Tavares:1986, key = "Orton, Peppard, and Tavares 1986", author = "G. Orton and L. E. Peppard and S. E. Tavares", title = "A fast asychronous {RSA} encryption chip", booktitle = "Proc. IEEE 1986 Custom Integrated Circuits Conference", year = 1986, pages = "430-442"} @article{Jamnig:1988, key = "Jamnig 1988", author = "P. Jamnig", title = "Securing the {RSA}--cryptosystem against cycling attacks", journal = "Cryptologia", volume = 12, year = 1988, pages = "159-164"} @article{Kapoor:1989, key = "Kapoor 1989", author = "B. L. Kapoor", title = "Cryptanalysis of the {RSA} open encryption-key system", journal = "International Journal on Policy and Information", volume = 13, year = 1989, pages = "105-114"} @article{de.Laurentis:1984, key = "DeLaurentis 1984", author = "J. M. DeLaurentis", title = "A further weakness in the common modulus protocol for the {RSA} cryptoalgorithm", journal = "Cryptologia", volume = 8, year = 1984, pages = "253-259"} @article{Wiener:1990, key = "Wiener 1990", author = "M. J. Wiener", title = "Cryptanalysis of short {RSA} secret exponents", journal = IEEE-IT, volume = 36, year = 1990, pages = "553-558"} @inproceedings{Clayden:1985, key = "Clayden 1985", author = "D. O. Clayden", title = "Some methods of calculating the {RSA} exponential", booktitle = "System Security: the Technical Challenge", publisher = "Online Publications", address = "London", year = 1985, pages = "173-183"} @inproceedings{Gordon:1985a, key = "J. Gordon 1985a", author = "J. A. Gordon", title = "Implementation of the {RSA}", booktitle = "System Security: the Technical Challenge", publisher = "Online Publications", address = "London", year = "{\noopsort{1985a}}1985", pages = "185-195"} @article{Selby&Mitchell:1989, key = "Selby and Mitchell 1989", author = "A. Selby and C. Mitchell", title = "Algorithms for software implementations of {RSA}", journal = IEEP, volume = "136-E", year = 1989, pages = "166-170"} @incollection{Zhang&Martin&Yun:1988, key = "Zhang, Martin, and Yun 1988", author = "C. N. Zhang and H. L. Martin and D. Y. Y. Yun", title = "Parallel algorithms and systolic array designs for {RSA} cryptosystem", booktitle = "Proc. Int'l Conf. on Systolic Arrays", year = 1988, editor = "K. Bromley and S.-Y. Kung and E. Swartzlander", publisher = "IEEE, Computer Society Press", pages = "341-350"} @incollection{Vandemeulebroecke.et.al:1990, key = "Vandemeulebroecke, Vanzieleghem, Denayer, and Jespers 1990", author = "A. Vandemeulebroecke and E. Vanzieleghem and T. Denayer and P. G. A. Jespers", title = "A Single chip 1024 bits {RSA} processor", booktitle = EUROCRYPT89, editor = "J.-J. Quisquater and J. Vandewalle", year = 1990, pages = "219-236", publisher = SV} @incollection{Hule&Muller:1988, key = "Hule and {M\"uller} 1987", author = "H. Hule and W. B. {M\"uller}", title = "On the {RSA}-cryptosystem with wrong keys", booktitle = "Contributions to General Algebra 6", year = 1988, publisher = HPT, address = "Vienna", pages = "103-109"} @incollection{Evertse&van.Heyst:1991, key = "Evertse and van Heyst 1991", author = "J.-H. Evertse and Heyst, E. van", title = "Which new {RSA} signatures can be computed from some given {RSA} signatures?", booktitle = EUROCRYPT90, publisher = SV, editor = "I. B. {Damg\aa ard}", series = LNICS, volume = 473, year = 1991, pages = "83-97"} @article{Evertse&van.Heyst:1992, key = "Evertse and van Heyst 1992", author = "J.-H. Evertse and Heyst, E. van", title = "Which new {RSA}-signatures can be computed from certain given {RSA}-signatures?", journal = JC, volume = 5, year = 1992, pages = "41-52"} @incollection{Orup&Svensen&Andreasen:1991, key = "Orup, Svendsen, and Andreasen 1991", author = "H. Orup and E. Svendsen and E. Andreasen", title = "VICTOR: an efficient {RSA} hardware implementation", booktitle = EUROCRYPT90, publisher = SV, editor = "I. B. {Damg\aa ard}", series = LNICS, volume = 473, year = 1991, pages = "245-252"} @incollection{CooperR&Patterson:1990, key = "R. Cooper and Patterson 1990", author = "R. H. Cooper and W. Patterson", title = "{RSA} as a benchmark for multiprocessor machines", booktitle = AUSCRYPT90, editor = "J. Seberry and J. Pieprzyk", publisher = SV, series = LNICS, volume = 453, year = 1990, pages = "356-359"} @incollection{Huber:1991, key = "Huber 1991", author = "K. Huber", title = "Some considerations concerning the selection of {RSA} moduli", booktitle = EUROCRYPT91, publisher = SV, series = LNICS, editor = "D. W. Davies", number = 547, year = 1991, pages = "294-301"} @incollection{Fiat:1990, key = "Fiat 1990", author = "A. Fiat", title = "Batch {RSA}", booktitle = CRYPTO89, editor = "G. Brassard", publisher = SV, year = 1990, series = LNICS, volume = 435, pages = "175-185"} @incollection{Brickell:1990, key = "Brickell 1990", author = "E. Brickell", title = "A survey of hardware implementations of {RSA}", booktitle = CRYPTO89, editor = "G. Brassard", publisher = SV, year = 1990, series = LNICS, volume = 435, pages = "368-370"} @incollection{Chuang&Dunham:1991, key = "Chuang and Dunham 1991", title = "Matrix extensions of the {RSA} algorithm", author = "C.-C. Chuang and J. G. Dunham", booktitle = CRYPTO90, editor = "A. J. Menezes and S. A. Vanstone", publisher = SV, year = 1991, series = LNICS, volume = 537, pages = "140-155"} @incollection{Iwamura&Matsumoto&Imai:1993b, key = "Iwamura, Matsumoto, and Imai 1993b", author = "K. Iwamura and T. Matsumoto and H. Imai", title = "High-speed implementation methods for {RSA} scheme", booktitle = EUROCRYPT92, editor = "R. A. Rueppel", series = LNICS, volume = 658, year = "{\noopsort{1993b}}1993", publisher = SV, pages = "221-237"} @incollection{Pfitzmann&Waidner:1993, key = "Pfitzmann and Waidner 1993", author = "B. Pfitzmann and M. Waidner", title = "Attacks on protocols for server-aided {RSA} computation", booktitle = EUROCRYPT92, editor = "R. A. Rueppel", series = LNICS, volume = 658, year = 1993, publisher = SV, pages = "153-162"} @article{Kaliski:1993, key = "Kaliski 1993", author = "Kaliski, Jr., B. S.", title = "Anderson's {RSA} trapdoor can be broken", journal = ELETT, volume = 29, year = 1993, pages = "1387-1388"} @article{Anderson:1993, key = "Anderson 1993", author = "R. J. Anderson", title = "Practical {RSA} trapdoor", journal = ELETT, volume = 29, year = 1993, pages = 995} @article{Derome:1993, key = "{Der\^{o}me} 1993", author = "M. F. A. {Der\^{o}me}", title = "Generating {RSA} keys without the {Euclid} algorithm", journal = ELETT, volume = 29, year = 1993, pages = "19-21"} @article{Wu&Wang:1993, key = "Wu and Wang 1993", author = "C.-K. Wu and X.-M. Wang", title = "Determination of the true value of the {Euler} totient function in the {RSA} cryptosystem from a set of possibilities", journal = ELETT, volume = 29, year = 1993, pages = "84-85"} @article{SmithP:1993, key = "P. Smith 1993", author = "P. Smith", title = "{LUC} public-key encryption: a secure alternative to {RSA}", journal = DDJ, month = "January", year = 1993, pages = "44-49"} @misc{Kolata:1994a, key = "Kolata 1994a", author = "G. Kolata", title = "The assault on 114,381,625,757,888,867,669,235,779,976,146,612,010,218, 296,721,242,362,562,561,842,935,706,935,245,733,897,830,597,123,563,958,705,058, 989,075,147,599,290,026,879,543,541", note = "{\it New York Times}, March 22 1994, p.~B5"} @misc{Kolata:1994b, key = "Kolata 1994b", author = "G. Kolata", title = "100 quadrillion calculations and, {Eureka!} problem solved", note = "{\it New York Times}, April 27 1994, p.~A11"} @article{Vanstone&Zuccherato:1994, key = "Vanstone and Zuccherato 1994", author = "S. Vanstone and R. J. Zuccherato", title = "Using four-prime {RSA} in which some of the bits are specified", journal = ELETT, volume = 30, year = 1994, pages = "2118-2119"} @article{Lim&Lee:1995, key = "Lim and Lee 1995", author = "C. H. Lim and P. J. Lee", title = "Use of {RSA} moduli with prespecified bits", journal = ELETT, volume = 31, year = 1995, pages = "785-786"} @article{Yen:1995, key = "Yen 1995", author = "S.-M. Yen", title = "Fast square-and-multiply exponentiation for {RSA}", journal = ELETT, volume = 31, year = 1995, pages = "712"} @article{Ganley:1990, key = "Ganley 1990", author = "M. J. Ganley", title = "Note on the generation of $p_0$ for {RSA} keysets", journal = ELETT, volume = 26, year = 1990, pages = "369"}