In the generation method for RSA-moduli proposed by Boneh and Franklin in [BF97] the partial signing servers generate random shares p i ; q i and compute as candidate for an RSA-modulus n = pq where p = ( p i ) and q = ( q i ). Then they perform a time-consuming distributed primality test which simultaneously checks the primality both of p and q by computing g = 1 mod n. The primality test proposed in [BF97] cannot be generalized to products of more than two primes. A more complicated one for products of three primes was presented in [BH98]
International audienceWe present three attacks on the Prime Power RSA with mod-ulus N = p^r q. In th...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus i...
International audienceRSA public keys are central to many cryptographic applications; hence their va...
In applied cryptography, RSA is a typical asymmetric algorithm, which is used in electronic transact...
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to con...
The Multi-Prime Power RSA is an efficient variant of the RSA cryptosystem with a modulus of the form...
We present a new protocol for efficient distributed computation modulo a shared secret. We further p...
Factoring large integers is a fundamental problem in algebraic number theory and modern cryptography...
Since the discovery of the RSA encryption scheme, primality domain has gained much interest. For the...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
We revisit the factoring with known bits problem on RSA moduli. In 1996, Coppersmith showed that the...
In 1976, Diffie and Hellman introduced the idea of a public-key cryptosystem. Subsequently, Rivest, ...
Cryptographic algorithms are oftenly based on large prime numbers. It is a difficult task to generat...
A new structure to develop 64-bit RSA encryption engine on FPGA is being presented in this paper tha...
In this paper, for given N = pq with p and q different odd primes, and m = 1, 2, · · · , we give ...
International audienceWe present three attacks on the Prime Power RSA with mod-ulus N = p^r q. In th...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus i...
International audienceRSA public keys are central to many cryptographic applications; hence their va...
In applied cryptography, RSA is a typical asymmetric algorithm, which is used in electronic transact...
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to con...
The Multi-Prime Power RSA is an efficient variant of the RSA cryptosystem with a modulus of the form...
We present a new protocol for efficient distributed computation modulo a shared secret. We further p...
Factoring large integers is a fundamental problem in algebraic number theory and modern cryptography...
Since the discovery of the RSA encryption scheme, primality domain has gained much interest. For the...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
We revisit the factoring with known bits problem on RSA moduli. In 1996, Coppersmith showed that the...
In 1976, Diffie and Hellman introduced the idea of a public-key cryptosystem. Subsequently, Rivest, ...
Cryptographic algorithms are oftenly based on large prime numbers. It is a difficult task to generat...
A new structure to develop 64-bit RSA encryption engine on FPGA is being presented in this paper tha...
In this paper, for given N = pq with p and q different odd primes, and m = 1, 2, · · · , we give ...
International audienceWe present three attacks on the Prime Power RSA with mod-ulus N = p^r q. In th...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus i...
International audienceRSA public keys are central to many cryptographic applications; hence their va...