We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Australia e-mail: joseph_tonien@uow.edu.au
An abstract is not available for this content so a preview has been provided. Please use the Get access link above for information on how to access this content.
Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)
References
1
1.Olds, C. D., Continued fractions, The Mathematical Association of America (1963).CrossRefGoogle Scholar
2
2.Wiener, M., Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory36 (1990) pp. 553–558.CrossRefGoogle Scholar
3
3.Bunder, M. and Tonien, J., A new attack on the RSA cryptosystem based on continued fractions, Malaysian Journal of Mathematical Sciences11(S) (August 2017) pp. 45–57.Google Scholar