Continued fractions and RSA with small secret exponent

A Dujella - arXiv preprint cs/0402052, 2004 - arxiv.org
Extending the classical Legendre's result, we describe all solutions of the inequality| xa/b|<
c/b^ 2 in terms of convergents of continued fraction expansion of x. Namely, we show that …

On some attacks on multi-prime RSA

MJ Hinek, MK Low, E Teske - Selected Areas in Cryptography: 9th Annual …, 2003 - Springer
Using more than two factors in the modulus of the RSA cryptosystem has the arithmetic
advantage that the private key computations can be speeded up using Chinese …

An efficient method for attack RSA scheme

SJ Aboud - 2009 Second International Conference on the …, 2009 - ieeexplore.ieee.org
The security on many public key encryption schemes relied on the intractability of finding the
integer factoring problem such as RSA scheme. However, there are great deals of …

A variant of Wiener's attack on RSA

A Dujella - Computing, 2009 - Springer
Wiener's attack is a well-known polynomial-time attack on a RSA cryptosystem with small
secret decryption exponent d, which works if d< n 0.25, where n= pq is the modulus of the …

[PDF][PDF] Performance evaluation of several efficient RSA variants

M Ali-Al-Mamun, MM Islam, SM Romman… - Int. J. Comput. Sci. Netw …, 2008 - Citeseer
This paper includes survey on various research areas, such as efficient implementation of
RSA which includes RSA key generation, its application, different RSA variants, faster RSA …

Attacks on low private exponent RSA: An experimental study

TD Nguyen, TD Nguyen, LD Tran - 2013 13th International …, 2013 - ieeexplore.ieee.org
RSA cryptosystem is the most popular public key cryptosystem which provides both secrecy
and digital signatures. Due to RSA's popularity, many attacks on it have been developed. In …

[图书][B] Improved RSA Algorithm Based on Cloud Database using Proth Number and Mersenne Prime Number

A Kumar - 2020 - academia.edu
Improved RSA Algorithm Based on Cloud Database using Proth Number and Mersenne Prime
Number Page 1 © 2020 IJSRET 259 International Journal of Scientific Research & Engineering …

[PDF][PDF] An effective method for attack rsa strategy

V Mehrotra, PS Rana - Int. J. Advanced Networking and Applications, 2012 - Citeseer
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-------------------The protection on many public key encoding schemes depended on the …

[PDF][PDF] A survey of cryptanalytic attacks on RSA

F da Costa Boucinha - Instituto superior técnico, Universidade …, 2011 - koala.cs.pub.ro
A Survey of Cryptanalytic Attacks on RSA Mathematics and Fundamental Applications Page 1
A Survey of Cryptanalytic Attacks on RSA Filipe da Costa Boucinha A Dissertation presented in …

A modified variant of RSA algorithm for Gaussian integers

S Pradhan, BK Sharma - … of the Second International Conference on Soft …, 2014 - Springer
A Gaussian prime is a Gaussian integer that cannot be expressed in the form of the product
of other Gaussian integers. The concept of Gaussian integer was introduced by Gauss [4] …