Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,894,050 papers from all fields of science
Search
Sign In
Create Free Account
Wiener's attack
The Wiener's attack, named after cryptologist Michael J. Wiener, is a type of cryptographic attack against RSA. The attack uses the continued…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Alice and Bob
Cryptosystem
Encryption
Euclidean algorithm
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
An Analysis of the Attack on RSA Cryptosystem Through Formal Methods
Sachin Upadhyay
,
Yashpal Singh
,
Amit Jain
2012
Corpus ID: 212561112
:- Communication is the basic process of exchanging information. The effectiveness of computer communication is mainly based on…
Expand
2010
2010
Broadcasting Multi-signature on Generalized Conic Curve over Z_n
Jiang Ming-ming
2010
Corpus ID: 123708230
On basis of the introduction of the order and the base point on the generalized conic curve over Zn,the discrete a logrithm…
Expand
2010
2010
The additional result over the work of Blomer and May
Navaneet Ojha
,
Sahadeo Padhye
International Conference on Computing and…
2010
Corpus ID: 31831254
In this paper we improve the range of weak keys of RSA cryptosystem for the Generalized Wiener's attack given by Blomer & May. We…
Expand
2009
2009
Digital multisignature on the generalized conic curve over Zn
Song Lin
,
Biao Wang
,
Zhoujun Li
Computers & security
2009
Corpus ID: 41020480
2008
2008
A variant of Wiener's attack on RSA with small secret exponent
A. Dujella
ACM Communications in Computer Algebra
2008
Corpus ID: 52807941
To speed up the RSA decryption one may try to use small secret decryption exponent d. The choice of a small d is especially…
Expand
Highly Cited
2008
Highly Cited
2008
Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings
S. Vaudenay
International Conference on Cryptology in Africa
2008
Corpus ID: 7094145
AES.- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds.- Implementation of the AES-128 on Virtex-5 FPGAs.- Analysis…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE