Further cryptanalysis of a type of RSA variants
From MaRDI portal
Publication:6111988
DOI10.1007/978-3-031-22390-7_9zbMath1530.94043OpenAlexW4313157610MaRDI QIDQ6111988
Da-Wu Gu, Gongyu Shi, Geng Wang
Publication date: 4 August 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22390-7_9
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of RSA with more than one decryption exponent
- Factoring polynomials with rational coefficients
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- Cryptanalysis of RSA with small prime difference
- Cryptanalysis of RSA variants with modified Euler quotient
- A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations
- Classical attacks on a variant of the RSA cryptosystem
- Cryptanalysis of RSA variants with primes sharing most significant bits
- Cryptanalysis of the RSA variant based on cubic Pell equation
- An efficient probabilistic public-key cryptosystem over quadratic fields quotients
- A novel RSA-like cryptosystem based on a generalization of the Rédei rational functions
- Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
- A New Attack on Three Variants of the RSA Cryptosystem
- An Improved Analysis on Three Variants of the RSA Cryptosystem
- Cryptanalysis of short RSA secret exponents
- Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
- A method for obtaining digital signatures and public-key cryptosystems
- Cryptanalysis of RSA with private key d less than N/sup 0.292/
- Cryptanalysis of RSA with Multiple Small Secret Exponents
- Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith’s Technique and Applications to RSA
- Partial Key Exposure Attacks on RSA up to Full Size Exponents
- Advances in Cryptology - CRYPTO 2003
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
This page was built for publication: Further cryptanalysis of a type of RSA variants