A security analysis of two classes of RSA-like cryptosystems
P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
In this paper, we apply the continued fraction method to launch an attack on the three RSA-
type cryptosystems when the private exponent d is sufficiently small. The first cryptosystem …
type cryptosystems when the private exponent d is sufficiently small. The first cryptosystem …
Cryptanalysis of RSA variants with modified Euler quotient
M Zheng, N Kunihiro, H Hu - … on Cryptology in Africa, Marrakesh, Morocco …, 2018 - Springer
The standard RSA scheme provides the key equation ed ≡ 1 φ (N) ed≡ 1 (mod φ (N)) for
N= pq N= pq, where φ (N)=(p-1)(q-1) φ (N)=(p-1)(q-1) is Euler quotient (or Euler's totient …
N= pq N= pq, where φ (N)=(p-1)(q-1) φ (N)=(p-1)(q-1) is Euler quotient (or Euler's totient …
Exponential increment of RSA attack range via lattice based cryptanalysis
A Nitaj, MRK Ariffin, NNH Adenan, DS Merenda… - Multimedia Tools and …, 2022 - Springer
The RSA cryptosystem comprises of two important features that are needed for encryption
process known as the public parameter e and the modulus N. In 1999, a cryptanalysis on …
process known as the public parameter e and the modulus N. In 1999, a cryptanalysis on …
A generalised bound for the Wiener attack on RSA
Since Wiener pointed out that the RSA can be broken if the private exponent d is relatively
small compared to the modulus N, it has been a general belief that the Wiener attack works …
small compared to the modulus N, it has been a general belief that the Wiener attack works …
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations
This paper investigates a novel RSA-like cryptosystem proposed by Murru-Saettone. This
cryptosystem is constructed from a cubic field connected to the cubic Pell equation and …
cryptosystem is constructed from a cubic field connected to the cubic Pell equation and …
Small Private Key Attack Against a Family of RSA-like Cryptosystems
G Teseleanu, P Cotan - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Let $ N= pq $ be the product of two balanced prime numbers $ p $ and $ q $. Elkamchouchi,
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …
The Wiener attack on RSA revisited: a quest for the exact bound
Since Wiener pointed out that the RSA can be broken if the private exponent d is relatively
small compared to the modulus N (using the continued fraction technique), it has been a …
small compared to the modulus N (using the continued fraction technique), it has been a …
Small Private Key Attack Against a Family of RSA-Like Cryptosystems
P Cotan, G Teşeleanu - Nordic Conference on Secure IT Systems, 2023 - Springer
Let N= pq be the product of two balanced prime numbers p and q. Elkamchouchi,
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …
A Continued Fraction-Hyperbola based Attack on RSA cryptosystem
GR Bansimba, RF Babindamana… - arXiv preprint arXiv …, 2023 - arxiv.org
In this paper we present new arithmetical and algebraic results following the work of
Babindamana and al. on hyperbolas and describe in the new results an approach to …
Babindamana and al. on hyperbolas and describe in the new results an approach to …