Author of the publication

Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys.

, , , , and . ESORICS (2), volume 12309 of Lecture Notes in Computer Science, page 505-524. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components., , , , , and . CCS, page 1583-1600. ACM, (2017)On Secrecy Amplification Protocols., , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 3-19. Springer, (2015)Secure Cloud Storage System for Digital Evidence., , , , , , and . ICUMT, page 134-139. IEEE, (2023)I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability., , , , and . ICETE (2), page 25-36. SciTePress, (2019)Evolutionary Design of Attack Strategies.. Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 18-23. Springer, (2009)The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli., , , , and . CCS, page 1631-1648. ACM, (2017)BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256., , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 123-149. Springer, (2017)Attack Detection vs. Privacy - How to Find the Link or How to Hide It?, , , and . Security Protocols Workshop, volume 7114 of Lecture Notes in Computer Science, page 189-199. Springer, (2011)Reconsidering Attacker Models in Ad-Hoc Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 219-227. Springer, (2016)Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion).. Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 228-231. Springer, (2016)