[图书][B] Cryptanalysis of RSA and its variants

MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …

A lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack

A Bhattacharjya, X Zhong, X Li - IEEE Access, 2019 - ieeexplore.ieee.org
For virtual private network and LAN-to-LAN tunnel sessions, End-to-End security is the main
constraint in private messaging scenarios. Internet Protocol Security can negotiate new keys …

On the security of some variants of RSA

MJ Hinek - 2007 - uwspace.uwaterloo.ca
The RSA cryptosystem, named after its inventors, Rivest, Shamir and Adleman, is the most
widely known and widely used public-key cryptosystem in the world today. Compared to …

A secure hybrid RSA (SHRSA)-based lightweight and efficient personal messaging communication protocol

A Bhattacharjya, X Zhong, J Wang, X Li - Digital Twin Technologies and …, 2020 - Springer
Balancing efficiency, privacy, and security along with strong authentication in the End-to-End
(E2E) communication is a burning issue in personal messaging. Rivest–Shamir–Adleman …

An application of Euclidean algorithm in cryptanalysis of RSA

D Poulakis - Elemente Der Mathematik, 2020 - ems.press
Let p and q be two odd primes of the same size and n= pq. Consider integers e, d with 1< e,
d< φ (n) such that ed≡ 1 (mod φ (n)). Then (n, e) and d are the public and the private key …

An application of low private exponent attack on RSA

YH Zheng, YF Zhu, H Xu - 2009 4th International Conference …, 2009 - ieeexplore.ieee.org
RSA is one of the most popular and widely used public key cryptosystems. In this paper, an
application of low private exponent attack on it is presented. More precisely, let (N, e) be an …

An Attack on Small Private Keys of RSA Based on Euclidean Algorithm

D Poulakis - Cryptology ePrint Archive, 2019 - eprint.iacr.org
In this paper, we describe an attack on RSA cryptosystem which is based on Euclid's
algorithm. Given a public key $(n, e) $ with corresponding private key $ d $ such that $ e …

[引用][C] Το κρυπτοσύστημα RSA και η κρυπτανάλυσή του

Α Μπραζιώτης