Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
54
views
11
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
6,571
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology - ASIACRYPT 2013
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
other
Author(s):
Daniel J. Bernstein
,
Yun-An Chang
,
Chen-Mou Cheng
,
Li-Ping Chou
,
Nadia Heninger
,
Tanja Lange
,
Nicko van Someren
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Smart Contracts Programming Languages
Most cited references
11
Record
: found
Abstract
: not found
Article
: not found
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
Don Coppersmith
(1997)
0
comments
Cited
76
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Harald Cramér and the distribution of prime numbers
Andrew Granville
(1995)
0
comments
Cited
29
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
Don Coppersmith
(1996)
0
comments
Cited
20
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 341-360
DOI:
10.1007/978-3-642-42045-0_18
SO-VID:
ca1136f3-b6ed-4686-93b2-35b087e3e857
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 100
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
pp. 140
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
pp. 280
Constrained Pseudorandom Functions and Their Applications
pp. 301
Fully Homomorphic Message Authenticators
pp. 321
Non-uniform Cracks in the Concrete: The Power of Free Precomputation
pp. 341
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
Similar content
6,571
The phylogeography of red and yellow coppersmith barbets (Aves: Megalaima haemacephala)
Authors:
R Den Haan
,
J. Leonard
Estresse ocupacional em equipes saúde da família certificadas e não certificadas com selo de qualidade assistencial
Translated title: Occupational stress in family health teams certified and non-certified with assistance quality seal
Translated title: Estrés laboral en equipos de salud familiar certificados y no certificados con sello de calidad asistencial
Authors:
Luiza Silva
,
Alessandro Rolim Scholze
,
Paloma de Souza Cavalcante Pissinati
…
Implementation of quality indicators for vulvar cancer in gynaecological cancer centres certified by the German Cancer Society (DKG)
Authors:
Frederik A. Stuebs
,
Matthias W. Beckmann
,
Christian Dannecker
…
See all similar
Cited by
11
Cache Attacks Enable Bulk Key Recovery on the Cloud
Authors:
Mehmet Sinan Inci
,
Berk Gulmezoglu
,
Gorka Irazoqui
…
A Formal Treatment of Backdoored Pseudorandom Generators
Authors:
Yevgeniy Dodis
,
Chaya Ganesh
,
Alexander Golovnev
…
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Authors:
Jean Degabriele
,
Kenneth G. Paterson
,
Jacob Schuldt
…
See all cited by