[图书][B] Cryptanalysis of RSA and its variants

MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …

Revisiting Wiener's attack–new weak keys in RSA

S Maitra, S Sarkar - International Conference on Information Security, 2008 - Springer
In this paper we revisit Wiener's method (IEEE-IT, 1990) of continued fraction (CF) to find
new weaknesses in RSA. We consider RSA with N= pq, q< p< 2 q, public encryption …

A tool kit for partial key exposure attacks on RSA

A Takayasu, N Kunihiro - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
Thus far, partial key exposure attacks on RSA have been intensively studied using lattice
based Coppersmith's methods. In the context, attackers are given partial information of a …

An efficient method for attack RSA scheme

SJ Aboud - 2009 Second International Conference on the …, 2009 - ieeexplore.ieee.org
The security on many public key encryption schemes relied on the intractability of finding the
integer factoring problem such as RSA scheme. However, there are great deals of …

General bounds for small inverse problems and its applications to multi-prime RSA

A Takayasu, N Kunihiro - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
In 1999, Boneh and Durfee introduced the small inverse problem, which solves the bivariate
modular equation x (N+y)≡ 1 (mod e. Absolute values of solutions for x and y are bounded …

Common modulus attacks on small private exponent RSA and some fast variants (in practice)

MJ Hinek, CCY Lam - Journal of Mathematical Cryptology, 2010 - degruyter.com
In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's
continued fraction attack works much better in practice than previously expected. Given …

A unified method for private exponent attacks on RSA using lattices

HM Bahig, DI Nassr, A Bhery, A Nitaj - International Journal of …, 2020 - World Scientific
Let (n= pq, e= n β) be an RSA public key with private exponent d= n δ, where p and q are
large primes of the same bit size. At Eurocrypt 96, Coppersmith presented a polynomial-time …

A unified framework for small secret exponent attack on RSA

N Kunihiro, N Shinohara, T Izu - … , SAC 2011, Toronto, ON, Canada, August …, 2012 - Springer
We address a lattice based method on small secret exponent attack on RSA scheme. Boneh
and Durfee reduced the attack into finding small roots of a bivariate modular equation …

Cryptanalysis of RSA with smooth prime sum

MC Semmouni, A Nitaj, M Belkasmi - Journal of Discrete …, 2022 - Taylor & Francis
Let N= pq be an RSA modulus with balanced prime factors, that is q< p< 2 q. There exist
infinitely many integers x, y and z such that ex-ϕ (N) y=(p+ q-1) z. We show that if the prime …

Partial key attack given MSBs of CRT-RSA private keys

AH Abd Ghafar, MR Kamel Ariffin, S Md Yasin… - Mathematics, 2020 - mdpi.com
The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. It
exploits the properties of the Chinese remainder theorem (CRT) to elegantly reduce the size …