Abstract. It is well-known that there is an efficient method for decrypting/signing with RSA when the secret exponent d is small modulo p − 1 and q − 1. We call such an exponent d a small CRT-exponent. It is one of the major open problems in attacking RSA whether there exists a polynomial time attack for small CRT-exponents, i.e. a result that can be considered as an equivalent to the Wiener and Boneh-Durfee bound for small d. At Crypto 2002, May presented a partial solution in the case of an RSA modulus N = pq with unbalanced prime factors p and q. Based on Coppersmith’s method, he showed that there is a polynomial time attack provided that q < N 0.382. We will improve this bound to q < N 0.468. Thus, our result comes close to the de...
Given knowledge of one or more of the primes in a multiprime RSA modulus we show that the private ex...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus...
An important attack on multi-power RSA (N = prq) was introduced by Sarkar in 2014, by extending the ...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
Abstract. Wiener’s famous attack on RSA with d < N0.25 shows that using a small d for an efficien...
We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In our scena...
Abstract. We consider RSA-type schemes with modulus N = p r q for r ≥ 2. We present two new attacks ...
Abstract. We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In ...
[[abstract]]In some applications, a short private exponent d is chosen to improve the decryption or ...
Abstract. At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponen...
Abstract. We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and...
In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's continued fr...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Given knowledge of one or more of the primes in a multiprime RSA modulus we show that the private ex...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus...
An important attack on multi-power RSA (N = prq) was introduced by Sarkar in 2014, by extending the ...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
Abstract. It is well-known that there is an efficient method for decrypt-ing/signing with RSA when t...
Abstract. Wiener’s famous attack on RSA with d < N0.25 shows that using a small d for an efficien...
We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In our scena...
Abstract. We consider RSA-type schemes with modulus N = p r q for r ≥ 2. We present two new attacks ...
Abstract. We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In ...
[[abstract]]In some applications, a short private exponent d is chosen to improve the decryption or ...
Abstract. At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponen...
Abstract. We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and...
In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's continued fr...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Given knowledge of one or more of the primes in a multiprime RSA modulus we show that the private ex...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus...
An important attack on multi-power RSA (N = prq) was introduced by Sarkar in 2014, by extending the ...