Abstract. We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and Durfee reduced the attack into finding small roots of a bivariate modular equation: x(N+1+y)+1 ≡ 0 ( mod e), where N is an RSA moduli and e is the RSA public key. Boneh and Dur-fee proposed a lattice based algorithm for solving the problem. When the secret exponent d is less than N0.292, their method breaks RSA scheme. Since the lattice used in the analysis is not full-rank, the analysis is not easy. Blömer and May gave an alternative algorithm. Although their bound d ≤ N0.290 is worse than Boneh–Durfee result, their method used a full rank lattice. However, the proof for their bound is still complicated. Herrmann and May gave an elementary...
[[abstract]]In some applications, a short private exponent d is chosen to improve the decryption or ...
[[abstract]]This investigation proposes two methods for embedding backdoors in the RSA modulus N = p...
An important attack on multi-power RSA (N = prq) was introduced by Sarkar in 2014, by extending the ...
Abstract. We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In ...
We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In our scena...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Abstract. It is well-known that there is an efficient method for decrypting/signing with RSA when th...
Abstract. At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponen...
Abstract. We consider RSA-type schemes with modulus N = p r q for r ≥ 2. We present two new attacks ...
In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's continued fr...
International audienceThe RSA cryptosystem comprises of two important features that are needed for e...
Given knowledge of one or more of the primes in a multiprime RSA modulus we show that the private ex...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
[[abstract]]In some applications, a short private exponent d is chosen to improve the decryption or ...
[[abstract]]This investigation proposes two methods for embedding backdoors in the RSA modulus N = p...
An important attack on multi-power RSA (N = prq) was introduced by Sarkar in 2014, by extending the ...
Abstract. We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In ...
We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In our scena...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Abstract. It is well-known that there is an efficient method for decrypting/signing with RSA when th...
Abstract. At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponen...
Abstract. We consider RSA-type schemes with modulus N = p r q for r ≥ 2. We present two new attacks ...
In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's continued fr...
International audienceThe RSA cryptosystem comprises of two important features that are needed for e...
Given knowledge of one or more of the primes in a multiprime RSA modulus we show that the private ex...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
[[abstract]]In some applications, a short private exponent d is chosen to improve the decryption or ...
[[abstract]]This investigation proposes two methods for embedding backdoors in the RSA modulus N = p...
An important attack on multi-power RSA (N = prq) was introduced by Sarkar in 2014, by extending the ...