Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2015Best Paper
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
- David Adrian,
- Karthikeyan Bhargavan,
- Zakir Durumeric,
- Pierrick Gaudry,
- Matthew Green,
- J. Alex Halderman,
- Nadia Heninger,
- Drew Springall,
- Emmanuel Thomé,
- Luke Valenta,
- Benjamin VanderSloot,
- Eric Wustrow,
- Santiago Zanella-Béguelin,
- Paul Zimmermann
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityPages 5–17https://doi.org/10.1145/2810103.2813707We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed. First, we present Logjam, a novel flaw in TLS that lets a man-in-the-middle downgrade connections to "...
- ArticleMay 2011
An experiment of number field sieve over GF(p) of low hamming weight characteristic
The security of the digital signature algorithm (DSA) and Diffie-Hellman key exchange is based on the difficulty of the discrete logarithm problems (DLP) over prime field GF(p), and thus it is important to evaluate the difficulty of the DLP over GF(p) ...
- ArticleAugust 2010
Factorization of a 768-bit RSA modulus
- Thorsten Kleinjung,
- Kazumaro Aoki,
- Jens Franke,
- Arjen K. Lenstra,
- Emmanuel Thomé,
- Joppe W. Bos,
- Pierrick Gaudry,
- Alexander Kruppa,
- Peter L. Montgomery,
- Dag Arne Osvik,
- Herman Te Riele,
- Andrey Timofeev,
- Paul Zimmermann
This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses some implications for RSA.
- ArticleOctober 2007
Experiments on the linear algebra step in the number field sieve
This paper shows experimental results of the linear algebra step in the number field sieve on parallel environment with implementation techniques. We developed an efficient algorithm that shares the sum of vectors in each node, and the network structure ...
- ArticleApril 2006
An algorithm to solve the discrete logarithm problem with the number field sieve
PKC'06: Proceedings of the 9th international conference on Theory and Practice of Public-Key CryptographyPages 174–190https://doi.org/10.1007/11745853_12Recently, Shirokauer's algorithm to solve the discrete logarithm problem modulo a prime p has been modified by Matyukhin, yielding an algorithm with running time $L_{p}[\frac{1}{3},1.09018...]$, which is, at the present time, the best known estimate of ...
- ArticleAugust 2005
Scalable hardware for sparse systems of linear equations, with applications to integer factorization
CHES'05: Proceedings of the 7th international conference on Cryptographic hardware and embedded systemsPages 131–146https://doi.org/10.1007/11545262_10Motivated by the goal of factoring large integers using the Number Field Sieve, several special-purpose hardware designs have been recently proposed for solving large sparse systems of linear equations over finite fields using Wiedemann's algorithm. ...
- ArticleJanuary 2003
A Dedicated Sieving Hardware
We describe a hardware device for supporting the sieving step in integer factoring algorithms like the quadratic sieve or the number field sieve. In analogy to Bernstein's proposal for speeding up the linear algebra step, we rely on a mesh of very ...
- ArticleDecember 2002
Analysis of Bernstein's Factorization Circuit
In [1], Bernstein proposed a circuit-based implementation of the matrix step of the number field sieve factorization algorithm. These circuits offer an asymptotic cost reduction under the measure "construction cost run time". We evaluate the cost of ...
- articleJanuary 2002
Special prime numbers and discrete logs in finite prime fields
Mathematics of Computation (MCOM), Volume 71, Issue 237Pages 363–377https://doi.org/10.1090/S0025-5718-00-01308-9A set A of primes p involving numbers such as abt + c, where |a|, |b|, |c| = O(1) and t → ∞, is defined. An algorithm for computing discrete logs in the finite field of order p with p ∈ A is suggested. Its heuristic expected running time is Lp[1/3; (32/...
- articleMarch 2000
Integer Factoring
Designs, Codes and Cryptography (DCAC), Volume 19, Issue 2-3Pages 101–128https://doi.org/10.1023/A:1008397921377Using simple examples and informal discussions this article surveys the key ideas and major advances of the last quarter century in integer factorization.
- articleMarch 2000
Discrete Logarithms: The Past and the Future
Designs, Codes and Cryptography (DCAC), Volume 19, Issue 2-3Pages 129–145https://doi.org/10.1023/A:1008350005447The first practical public key cryptosystem to be published, the Diffie–Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. This intractability hypothesis is also the foundation for the presumed security ...