[图书][B] Cryptanalysis of RSA and its variants
MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …
several good surveys exist, they are either slightly outdated or only focus on one type of …
On the possibility of constructing meaningful hash collisions for public keys
A Lenstra, B De Weger - … , ACISP 2005, Brisbane, Australia, July 4-6, 2005 …, 2005 - Springer
It is sometimes argued that finding meaningful hash collisions might prove difficult. We show
that for several common public key systems it is easy to construct pairs of meaningful and …
that for several common public key systems it is easy to construct pairs of meaningful and …
Tunable balancing of RSA
SD Galbraith, C Heneghan, JF McKee - Australasian Conference on …, 2005 - Springer
We propose a key generation method for RSA moduli which allows the cost of the public
operations (encryption/verifying) and the private operations (decryption/signing) to be …
operations (encryption/verifying) and the private operations (decryption/signing) to be …
On the security of multi-prime RSA
MJ Hinek - Journal of Mathematical Cryptology, 2008 - degruyter.com
Multi-prime RSA is a variant of RSA in which the modulus is the product of more than two
distinct primes. In this work we collect the strongest known algebraic attacks on multi-prime …
distinct primes. In this work we collect the strongest known algebraic attacks on multi-prime …
On the security of some variants of RSA
MJ Hinek - 2007 - uwspace.uwaterloo.ca
The RSA cryptosystem, named after its inventors, Rivest, Shamir and Adleman, is the most
widely known and widely used public-key cryptosystem in the world today. Compared to …
widely known and widely used public-key cryptosystem in the world today. Compared to …
[PDF][PDF] Lattice attacks in cryptography: A partial overview
MJ Hinek - School of Computer Science, University of Waterloo …, 2004 - cacr.uwaterloo.ca
In this work, we give a partial overview of lattice attacks in cryptography. While different kinds
of attacks are considered, the emphasis of this work is given to attacks that are based on …
of attacks are considered, the emphasis of this work is given to attacks that are based on …
A tool kit for partial key exposure attacks on RSA
A Takayasu, N Kunihiro - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
Thus far, partial key exposure attacks on RSA have been intensively studied using lattice
based Coppersmith's methods. In the context, attackers are given partial information of a …
based Coppersmith's methods. In the context, attackers are given partial information of a …
General bounds for small inverse problems and its applications to multi-prime RSA
A Takayasu, N Kunihiro - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
In 1999, Boneh and Durfee introduced the small inverse problem, which solves the bivariate
modular equation x (N+y)≡ 1 (mod e. Absolute values of solutions for x and y are bounded …
modular equation x (N+y)≡ 1 (mod e. Absolute values of solutions for x and y are bounded …
Variants of RSA and their cryptanalysis
K Balasubramanian - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks
against these variants. The first variant I present is called the Efficient RSA, where the …
against these variants. The first variant I present is called the Efficient RSA, where the …
Cryptanalysis of multi-prime RSA with small prime difference
We show that the attack of de Weger on RSA using continued fractions extends to Multi-
Prime RSA. Let (n, e) be a Multi-Prime RSA public-key with private key d, where n= p 1 p 2⋯ …
Prime RSA. Let (n, e) be a Multi-Prime RSA public-key with private key d, where n= p 1 p 2⋯ …