Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
3
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,467
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT ’96
Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
other
Author(s):
Don Coppersmith
Publication date
(Online):
July 13 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
SAXS
Most cited references
3
Record
: found
Abstract
: not found
Article
: not found
NP-Complete decision problems for binary quadratics
Kenneth Manders
,
Leonard M. Adleman
(1978)
0
comments
Cited
12
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Factoring Based on Partial Information
Ronald L. Rivest
,
Adi Shamir
(1986)
0
comments
Cited
8
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Factoring with an Oracle
Ueli Maurer
(1993)
0
comments
Cited
4
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1996
Publication date (Online):
July 13 2001
Pages
: 178-189
DOI:
10.1007/3-540-68339-9_16
SO-VID:
ba04079d-8c1a-415b-bed3-d8f85a0fe36c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Low-Exponent RSA with Related Messages
pp. 10
Generating EIGamal Signatures Without Knowing the Secret Key
pp. 19
On the Security of Two MAC Algorithms
pp. 72
Multi-Authority Secret-Ballot Elections with Linear Work
pp. 84
Asymmetric Fingerprinting
pp. 143
Designated Verifier Proofs and Their Applications
pp. 155
Finding a Small Root of a Univariate Modular Equation
pp. 178
Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
pp. 190
Publicly Verifiable Secret Sharing
pp. 212
The Security of the Gabidulin Public Key Cryptosystem
pp. 224
Non-Linear Approximations in Linear Cryptanalysis
pp. 245
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding
pp. 307
Foiling Birthday Attacks in Length-Doubling Transformations
pp. 332
On Diffie-Hellman Key Agreement with Short Exponents
pp. 344
On the Security of a Practical Identification Scheme
pp. 354
Robust Threshold DSS Signatures
pp. 399
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
Similar content
5,467
A Method of Bivariate Interpolation and Smooth Surface Fitting for Irregularly Distributed Data Points
Authors:
Hiroshi Akima
A Comparative Assessment Between Three Machine Learning Models and Their Performance Comparison by Bivariate and Multivariate Statistical Methods in Groundwater Potential Mapping
Authors:
Seyed Naghibi
,
Hamid Reza Pourghasemi
Diagnostic Performance of PET or PET/CT Using 18 F-FDG Labeled White Blood Cells in Infectious Diseases: A Systematic Review and a Bivariate Meta-Analysis
Authors:
Marie Meyer
,
Nathalie Testart
,
Mario Jreige
…
See all similar
Cited by
20
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
Authors:
Giuseppe Ateniese
,
Jan Camenisch
,
Marc P Joye
…
A Group Signature Scheme with Improved Efficiency (Extended Abstract)
Authors:
Jan Camenisch
,
Markus Michels
Single-Database Private Information Retrieval with Constant Communication Rate
Authors:
Craig Gentry
,
Zulfikar Ramzan
See all cited by