A security analysis of two classes of RSA-like cryptosystems
From MaRDI portal
Publication:6635637
DOI10.1515/JMC-2024-0013MaRDI QIDQ6635637
Publication date: 12 November 2024
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Attacks on Shamir's `RSA for paranoids'
- Cryptanalysis of RSA with more than one decryption exponent
- Factoring integers with elliptic curves
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- Cryptanalysis of RSA with small prime difference
- Cryptanalysis of RSA variants with modified Euler quotient
- A generalized attack on RSA type cryptosystems
- A generalized attack on some variants of the RSA cryptosystem
- A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations
- Pell hyperbolas in DLP-based cryptosystems
- Classical attacks on a variant of the RSA cryptosystem
- Cryptanalysis of RSA variants with primes sharing most significant bits
- Cryptanalysis of the RSA variant based on cubic Pell equation
- A novel RSA-like cryptosystem based on a generalization of the Rédei rational functions
- Improving small private exponent attack on the Murru-Saettone cryptosystem
- Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
- A New Attack on Three Variants of the RSA Cryptosystem
- An Improved Analysis on Three Variants of the RSA Cryptosystem
- Cryptanalysis of short RSA secret exponents
- Another Generalization of Wiener’s Attack on RSA
- Revisiting Wiener’s Attack – New Weak Keys in RSA
- Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
- A method for obtaining digital signatures and public-key cryptosystems
- Cryptanalysis of RSA with Private Key d Less than N 0.292
- Cryptanalysis of RSA with Multiple Small Secret Exponents
- Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith’s Technique and Applications to RSA
- Partial Key Exposure Attacks on RSA up to Full Size Exponents
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography – PKC 2004
- Selecting cryptographic key sizes
- Continued fractions applied to a family of RSA-like cryptosystems
- Further cryptanalysis of a type of RSA variants
- DLP-based cryptosystems with Pell cubics
This page was built for publication: A security analysis of two classes of RSA-like cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6635637)