Beyond Provable Security Verifiable IND-CCA Security of OAEP, Lecture Notes in Computer Science, vol.21, issue.2, pp.180-196, 2011. ,
DOI : 10.1109/SP.2009.17
URL : https://hal.archives-ouvertes.fr/hal-01112084
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption, ACNS, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-13708-2_1
URL : https://hal.archives-ouvertes.fr/inria-00577142
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Optimal asymmetric encryption, Lecture Notes in Computer Science, vol.950, pp.92-111, 1994. ,
DOI : 10.1007/BFb0053428
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin, Lecture Notes in Computer Science, vol.1070, pp.399-416, 1996. ,
DOI : 10.1007/3-540-68339-9_34
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1, CRYPTO, pp.1-12, 1998. ,
DOI : 10.1007/BFb0055716
A Simple Unpredictable Pseudo-Random Number Generator, SIAM Journal on Computing, vol.15, issue.2, pp.364-383, 1986. ,
DOI : 10.1137/0215025
Breaking RSA may not be equivalent to factoring, Lecture Notes in Computer Science, vol.1403, pp.59-71, 1998. ,
DOI : 10.1007/BFb0054117
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities, Journal of Cryptology, vol.10, issue.4, pp.233-260, 1997. ,
DOI : 10.1007/s001459900030
Low-Exponent RSA with Related Messages, EUROCRYPT, pp.1-9, 1996. ,
DOI : 10.1007/3-540-68339-9_1
Time/Memory/Data Tradeoffs for Variants of the RSA Problem, Lecture Notes in Computer Science, vol.7936, pp.651-662, 2013. ,
DOI : 10.1007/978-3-642-38768-5_57
On the distribution of the power generator, Mathematics of Computation, vol.70, issue.236, pp.1575-1589, 2001. ,
DOI : 10.1090/S0025-5718-00-01283-7
Rsaoaep is secure under the rsa assumption, Kilian [16], pp.260-274 ,
An Improved Pseudo-random Generator Based on Discrete Log, CRYPTO, pp.469-481, 2000. ,
DOI : 10.1007/3-540-44598-6_29
Solving Simultaneous Modular Equations of Low Degree, SIAM Journal on Computing, vol.17, issue.2, pp.336-341, 1988. ,
DOI : 10.1137/0217019
Finite Fields, 1996. ,
DOI : 10.1017/CBO9780511525926
Efficient, perfect polynomial random number generators, Journal of Cryptology, vol.3, issue.3, pp.157-172, 1991. ,
DOI : 10.1007/BF00196909
URL : http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:bvb:12-bsb00057675-8
Oaep reconsidered, Kilian [16], pp.239-259 ,
DOI : 10.1007/3-540-44647-8_15
A computational introduction to number theory and algebra, 2006. ,
Vinogradov's mean value theorem via efficient congruencing, Annals of Mathematics, vol.175, issue.3, pp.1575-1627, 2012. ,
DOI : 10.4007/annals.2012.175.3.12
URL : http://arxiv.org/abs/1101.0574