[图书][B] Cryptanalysis of RSA and its variants
MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …
several good surveys exist, they are either slightly outdated or only focus on one type of …
Revisiting Wiener's attack–new weak keys in RSA
In this paper we revisit Wiener's method (IEEE-IT, 1990) of continued fraction (CF) to find
new weaknesses in RSA. We consider RSA with N= pq, q< p< 2 q, public encryption …
new weaknesses in RSA. We consider RSA with N= pq, q< p< 2 q, public encryption …
A tool kit for partial key exposure attacks on RSA
A Takayasu, N Kunihiro - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
Thus far, partial key exposure attacks on RSA have been intensively studied using lattice
based Coppersmith's methods. In the context, attackers are given partial information of a …
based Coppersmith's methods. In the context, attackers are given partial information of a …
An efficient method for attack RSA scheme
SJ Aboud - 2009 Second International Conference on the …, 2009 - ieeexplore.ieee.org
The security on many public key encryption schemes relied on the intractability of finding the
integer factoring problem such as RSA scheme. However, there are great deals of …
integer factoring problem such as RSA scheme. However, there are great deals of …
General bounds for small inverse problems and its applications to multi-prime RSA
A Takayasu, N Kunihiro - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
In 1999, Boneh and Durfee introduced the small inverse problem, which solves the bivariate
modular equation x (N+y)≡ 1 (mod e. Absolute values of solutions for x and y are bounded …
modular equation x (N+y)≡ 1 (mod e. Absolute values of solutions for x and y are bounded …
Common modulus attacks on small private exponent RSA and some fast variants (in practice)
In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's
continued fraction attack works much better in practice than previously expected. Given …
continued fraction attack works much better in practice than previously expected. Given …
A unified method for private exponent attacks on RSA using lattices
Let (n= pq, e= n β) be an RSA public key with private exponent d= n δ, where p and q are
large primes of the same bit size. At Eurocrypt 96, Coppersmith presented a polynomial-time …
large primes of the same bit size. At Eurocrypt 96, Coppersmith presented a polynomial-time …
A unified framework for small secret exponent attack on RSA
N Kunihiro, N Shinohara, T Izu - … , SAC 2011, Toronto, ON, Canada, August …, 2012 - Springer
We address a lattice based method on small secret exponent attack on RSA scheme. Boneh
and Durfee reduced the attack into finding small roots of a bivariate modular equation …
and Durfee reduced the attack into finding small roots of a bivariate modular equation …
Cryptanalysis of RSA with smooth prime sum
Let N= pq be an RSA modulus with balanced prime factors, that is q< p< 2 q. There exist
infinitely many integers x, y and z such that ex-ϕ (N) y=(p+ q-1) z. We show that if the prime …
infinitely many integers x, y and z such that ex-ϕ (N) y=(p+ q-1) z. We show that if the prime …
Partial key attack given MSBs of CRT-RSA private keys
The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. It
exploits the properties of the Chinese remainder theorem (CRT) to elegantly reduce the size …
exploits the properties of the Chinese remainder theorem (CRT) to elegantly reduce the size …