Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Partial Key Exposure Attacks on RSA up to Full Size Exponents - MaRDI portal

Partial Key Exposure Attacks on RSA up to Full Size Exponents

From MaRDI portal
Publication:5385740

DOI10.1007/11426639_22zbMath1137.94343OpenAlexW1871879997MaRDI QIDQ5385740

Alexander May, Benne de Weger, Ellen Jochemsz, Matthias Ernst

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_22




Related Items (31)

Cryptanalysis of Prime Power RSA with two private exponentsAttacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationClassical attacks on a variant of the RSA cryptosystemA variant of Wiener's attack on RSAApproximate divisor multiples -- factoring with only a third of the secret CRT-exponentsPartial Key Exposure Attack on CRT-RSAA New Partial Key Exposure Attack on Multi-power RSAContinued fractions applied to a family of RSA-like cryptosystemsFurther cryptanalysis of a type of RSA variantsBreaking Goppa-based McEliece with hintsDecoding McEliece with a hint -- secret Goppa key parts reveal everythingPartial key exposure attack on short secret exponent CRT-RSAOn the Improvement of the BDF Attack on LSBS-RSAA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsA Tool Kit for Partial Key Exposure Attacks on RSAOn the security of multi-prime RSAPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundImplicit Related-Key Factorization Problem on the RSA CryptosystemCryptanalysis of the RSA variant based on cubic Pell equationOn the optimality of lattices for the Coppersmith techniqueA method for obtaining digital signatures and public-key cryptosystemsUsing LLL-Reduction for Solving RSA and Factorization ProblemsFinding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystemPartial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsImproved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime FactorsPartial Key Exposure Attacks on RSA with Multiple Exponent PairsPartial Key Exposure: Generalized Framework to Attack RSAGeneralized cryptanalysis of small CRT-exponent RSACryptanalysis of Short Exponent RSA with Primes Sharing Least Significant BitsRevisiting prime power RSA


Uses Software



This page was built for publication: Partial Key Exposure Attacks on RSA up to Full Size Exponents