[图书][B] Cryptanalysis of RSA and its variants
MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …
several good surveys exist, they are either slightly outdated or only focus on one type of …
[图书][B] Cryptanalytic attacks on RSA
SY Yan - 2007 - books.google.com
RSA is the first workable and practicable public-key cryptographic system, based on the use
of large prime numbers. It is also the most popular and widely-used cryptographic system in …
of large prime numbers. It is also the most popular and widely-used cryptographic system in …
On the security of multi-prime RSA
MJ Hinek - Journal of Mathematical Cryptology, 2008 - degruyter.com
Multi-prime RSA is a variant of RSA in which the modulus is the product of more than two
distinct primes. In this work we collect the strongest known algebraic attacks on multi-prime …
distinct primes. In this work we collect the strongest known algebraic attacks on multi-prime …
A lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack
A Bhattacharjya, X Zhong, X Li - IEEE Access, 2019 - ieeexplore.ieee.org
For virtual private network and LAN-to-LAN tunnel sessions, End-to-End security is the main
constraint in private messaging scenarios. Internet Protocol Security can negotiate new keys …
constraint in private messaging scenarios. Internet Protocol Security can negotiate new keys …
On the security of some variants of RSA
MJ Hinek - 2007 - uwspace.uwaterloo.ca
The RSA cryptosystem, named after its inventors, Rivest, Shamir and Adleman, is the most
widely known and widely used public-key cryptosystem in the world today. Compared to …
widely known and widely used public-key cryptosystem in the world today. Compared to …
Toward a rigorous variation of Coppersmith's algorithm on three variables
A Bauer, A Joux - Advances in Cryptology-EUROCRYPT 2007: 26th …, 2007 - Springer
In 1996, Coppersmith introduced two lattice reduction based techniques to find small roots in
polynomial equations. One technique works for modular univariate polynomials, the other for …
polynomial equations. One technique works for modular univariate polynomials, the other for …
Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme
A Bhattacharjya, X Zhong… - International Journal of …, 2018 - inderscienceonline.com
Efficient balancing of privacy and strong authentication in end-to-end (E2E) security
constitutes a challenging task in the field of personal messaging. Since RSA is a ubiquitous …
constitutes a challenging task in the field of personal messaging. Since RSA is a ubiquitous …
A secure hybrid RSA (SHRSA)-based lightweight and efficient personal messaging communication protocol
A Bhattacharjya, X Zhong, J Wang, X Li - Digital Twin Technologies and …, 2020 - Springer
Balancing efficiency, privacy, and security along with strong authentication in the End-to-End
(E2E) communication is a burning issue in personal messaging. Rivest–Shamir–Adleman …
(E2E) communication is a burning issue in personal messaging. Rivest–Shamir–Adleman …
[PDF][PDF] A New Factoring Attack on Multi-Prime RSA with Small Prime Difference.
M Zheng, H Hu - IACR Cryptol. ePrint Arch., 2015 - Citeseer
In this paper, we study the security of multi-prime RSA whose modulus is N= p1p2··· pr for
r≥ 3 with small prime difference of size Nγ. In ACISP 2013, Zhang and Takagi showed a …
r≥ 3 with small prime difference of size Nγ. In ACISP 2013, Zhang and Takagi showed a …
[PDF][PDF] Common Private Exponent Attack on Multi Prime RSA
SK Ravva - International Journal of Electronics and Information …, 2017 - ijeie.jalaxy.com.tw
Multiprime RSA is a variant of RSA, where the modulus is the product of three or more prime
numbers. In this paper, we attack Multiprime RSA. Our attack assumes that many instances …
numbers. In this paper, we attack Multiprime RSA. Our attack assumes that many instances …