A security analysis of two classes of RSA-like cryptosystems

P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …

Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves

M Bunder, A Nitaj, W Susilo, J Tonien - Journal of information security and …, 2018 - Elsevier
In this paper, we apply the continued fraction method to launch an attack on the three RSA-
type cryptosystems when the private exponent d is sufficiently small. The first cryptosystem …

Cryptanalysis of RSA variants with modified Euler quotient

M Zheng, N Kunihiro, H Hu - … on Cryptology in Africa, Marrakesh, Morocco …, 2018 - Springer
The standard RSA scheme provides the key equation ed ≡ 1 φ (N) ed≡ 1 (mod φ (N)) for
N= pq N= pq, where φ (N)=(p-1)(q-1) φ (N)=(p-1)(q-1) is Euler quotient (or Euler's totient …

Exponential increment of RSA attack range via lattice based cryptanalysis

A Nitaj, MRK Ariffin, NNH Adenan, DS Merenda… - Multimedia Tools and …, 2022 - Springer
The RSA cryptosystem comprises of two important features that are needed for encryption
process known as the public parameter e and the modulus N. In 1999, a cryptanalysis on …

A generalised bound for the Wiener attack on RSA

W Susilo, J Tonien, G Yang - Journal of Information Security and …, 2020 - Elsevier
Since Wiener pointed out that the RSA can be broken if the private exponent d is relatively
small compared to the modulus N, it has been a general belief that the Wiener attack works …

A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations

W Susilo, J Tonien - Theoretical Computer Science, 2021 - Elsevier
This paper investigates a novel RSA-like cryptosystem proposed by Murru-Saettone. This
cryptosystem is constructed from a cubic field connected to the cubic Pell equation and …

Small Private Key Attack Against a Family of RSA-like Cryptosystems

G Teseleanu, P Cotan - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Let $ N= pq $ be the product of two balanced prime numbers $ p $ and $ q $. Elkamchouchi,
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …

The Wiener attack on RSA revisited: a quest for the exact bound

W Susilo, J Tonien, G Yang - Australasian Conference on Information …, 2019 - Springer
Since Wiener pointed out that the RSA can be broken if the private exponent d is relatively
small compared to the modulus N (using the continued fraction technique), it has been a …

Small Private Key Attack Against a Family of RSA-Like Cryptosystems

P Cotan, G Teşeleanu - Nordic Conference on Secure IT Systems, 2023 - Springer
Let N= pq be the product of two balanced prime numbers p and q. Elkamchouchi,
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …

A Continued Fraction-Hyperbola based Attack on RSA cryptosystem

GR Bansimba, RF Babindamana… - arXiv preprint arXiv …, 2023 - arxiv.org
In this paper we present new arithmetical and algebraic results following the work of
Babindamana and al. on hyperbolas and describe in the new results an approach to …