共 13 条
- [1] Origin Attribution of RSA Public Keys SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 374 - 396
- [2] An evaluation of the RSA private keys and the presence of weak keys JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (08): : 2273 - 2284
- [4] Correcting Errors in RSA Private Keys ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 351 - 369
- [5] Storing RSA private keys in your head 12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 129 - +
- [6] Bulk GCD Computation Using a GPU to Break Weak RSA Keys 2015 IEEE 29TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS, 2015, : 385 - 394
- [7] Reducing the Complexity in the Distributed Computation of Private RSA Keys INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 250 - 263
- [8] Recovering RSA Private Keys on Implementations with Tampered LSBs PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 453 - 460
- [9] A Practical Cold Boot Attack on RSA Private Keys PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017, : 55 - 60
- [10] Reconstructing RSA Private Keys from Random Key Bits ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 1 - +