Electronic newsgroup posting announcing the factorization of the 1039-th Mersenne number by the snfs, 2007. ,
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme, Journal of Cryptology, vol.16, issue.3, pp.185-215, 2003. ,
DOI : 10.1007/s00145-002-0120-1
Factoring integers with the number field sieve The development of the number field sieve, pp.50-94, 1993. ,
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding, Proceedings of Crypto'01, pp.433-439, 2001. ,
DOI : 10.1007/3-540-44647-8_25
Semaev An algorithm to solve the discrete logarithm problem with the number field sieve, Proceedings of the 9-th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography, pp.174-190, 2006. ,
Stern On the Security of rsa padding, Proceedings of Crypto'99, pp.1-18, 1999. ,
Attacks on Some RSA Signatures, Proceedings of Crypto'85, pp.18-27, 1986. ,
DOI : 10.1007/3-540-39799-X_3
Solving sparse rational linear systems, Proceedings of the 2006 international symposium on Symbolic and algebraic computation , ISSAC '06, pp.63-70, 2006. ,
DOI : 10.1145/1145768.1145785
Faster inversion and other black box matrix computations using efficient block projections, Proceedings of the 2007 international symposium on Symbolic and algebraic computation , ISSAC '07, pp.143-150, 2007. ,
DOI : 10.1145/1277548.1277569
URL : https://hal.archives-ouvertes.fr/hal-00127807
Selective Forgery of RSA Signatures Using Redundancy, Proceedings of Eurocrypt'97, pp.495-507, 1997. ,
DOI : 10.1007/3-540-69053-0_34
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method, Mathematics of Computation, vol.72, issue.242, pp.953-967, 2003. ,
DOI : 10.1090/S0025-5718-02-01482-5
URL : https://hal.archives-ouvertes.fr/hal-01102016
The number field sieve The development of the number field sieve, pp.11-42, 1993. ,
Selective forgery of rsa signatures with fixedpattern padding, Proceedings of the 5-th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography, pp.228-236, 2002. ,
A multiplicative attack using LLL algorithm on RSA signatures with redundancy, Proceedings of Crypto'97, pp.221-234, 1997. ,
DOI : 10.1007/BFb0052238
How (not) to design RSA signature schemes, Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography, pp.14-28, 1998. ,
DOI : 10.1007/BFb0054011
Square roots of products of algebraic numbers Mathematics of Computation 1943?1993: A Half-Century of, of Proc. Sympos, pp.567-571, 1994. ,