[图书][B] Cryptanalysis of RSA and its variants

MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …

Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound

A Takayasu, N Kunihiro - International Conference on Selected Areas in …, 2014 - Springer
Several algorithms have been proposed for factoring RSA modulus N when attackers know
the most or the least significant (β-δ)\log N bits of secret exponents d< N^ β. The attacks are …

On the security of some variants of RSA

MJ Hinek - 2007 - uwspace.uwaterloo.ca
The RSA cryptosystem, named after its inventors, Rivest, Shamir and Adleman, is the most
widely known and widely used public-key cryptosystem in the world today. Compared to …

A tool kit for partial key exposure attacks on RSA

A Takayasu, N Kunihiro - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
Thus far, partial key exposure attacks on RSA have been intensively studied using lattice
based Coppersmith's methods. In the context, attackers are given partial information of a …

An efficient method for attack RSA scheme

SJ Aboud - 2009 Second International Conference on the …, 2009 - ieeexplore.ieee.org
The security on many public key encryption schemes relied on the intractability of finding the
integer factoring problem such as RSA scheme. However, there are great deals of …

Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents

K Suzuki, A Takayasu, N Kunihiro - Theoretical Computer Science, 2020 - Elsevier
Partial key exposure attacks on RSA have been intensively studied by using lattice-based
Coppersmith's methods. Ernst et al.(Eurocrypt'05) studied the problem by considering three …

Temporal key generation and PKI gateway

RF Sulpizio - US Patent 10,205,598, 2019 - Google Patents
Primary Examiner-David Garcia Cervetti (74) Attorney, Agent, or Firm—Capitol Patent &
Trademark Law Firm, PLLC (57) ABSTRACT Temporal key generation devices and methods …

[HTML][HTML] A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography

RM Daniel, EB Rajsingh, S Silas - … of King Saud University-Computer and …, 2021 - Elsevier
Signcryption is an authenticated encryption technique that concurrently establishes
message confidentiality, authenticity, integrity and non-repudiation. In this paper, we …

Cryptanalysis of multi-prime RSA with small prime difference

HM Bahig, A Bhery, DI Nassr - … Conference, ICICS 2012, Hong Kong, China …, 2012 - Springer
We show that the attack of de Weger on RSA using continued fractions extends to Multi-
Prime RSA. Let (n, e) be a Multi-Prime RSA public-key with private key d, where n= p 1 p 2⋯ …

[PDF][PDF] Octonion algebra and noise-free fully homomorphic encryption (FHE) schemes

Y Wang - arXiv ePrint Archive Cornell University Library, 2016 - webpages.uncc.edu
Brakerski showed that linearly decryptable fully homomorphic encryption (FHE) schemes
cannot be secure in the chosen plaintext attack (CPA) model. In this paper, we show that …