International audienceIn this paper, we study some computational security assump-tions involve in two cryptographic applications related to the RSA cryp-tosystem. To this end, we use exponential sums to bound the statistical distances between these distributions and the uniform distribution. We are interesting studying the k least (or most) significant bits of x e mod N , where N is a RSA modulus when x is restricted to a small part of [0, N). First of all, we provide the first rigorous evidence that the cryptographic pseudo-random generator proposed by Micali and Schnorr is based on firm foundations. This proof is missing in the original paper and do not cover the parameters chosen by the authors. Consequently, we extend the proof to get a...
Abstract. RSA–CRT is the most widely used implementation for RSA signatures. However, determin-istic...
To speed up the RSA decryption one may try to use small secret decryption exponent d. However, in 19...
International audienceThe RSA cryptosystem comprises of two important features that are needed for e...
International audienceIn this paper, we study some computational security assump-tions involve in tw...
Let us fix a security parameter n and a sufficiently large encryption exponent e. We show that for a...
International audienceIn this paper, we study the security of the Micali-Schnorr pseudorandom number...
Abstract. In this paper, we study the security of the Micali-Schnorr pseudorandom number generator. ...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Abstract. Cryptographic primitives such as secure hash functions (e.g., SHA1, SHA2, and SHA3) and sy...
We give a polynomial time probabilistic algorithm that constructs an RSA modulus M=pl, where p and l...
This work presents mathematical properties of the RSA cryptosystem. The topics of backdoors and padd...
ABSTRACT. Two problems associated with RSA-encryption exponents are dis-cussed. Firstly, how many pl...
[[abstract]]LSBS-RSA denotes an RSA system with modulus primes, p and q , sharing a large number of ...
Abst rac t--A class of RSA encryption exponents whose corresponding decryption exponents have a bitl...
Abstract. RSA–CRT is the most widely used implementation for RSA signatures. However, determin-istic...
To speed up the RSA decryption one may try to use small secret decryption exponent d. However, in 19...
International audienceThe RSA cryptosystem comprises of two important features that are needed for e...
International audienceIn this paper, we study some computational security assump-tions involve in tw...
Let us fix a security parameter n and a sufficiently large encryption exponent e. We show that for a...
International audienceIn this paper, we study the security of the Micali-Schnorr pseudorandom number...
Abstract. In this paper, we study the security of the Micali-Schnorr pseudorandom number generator. ...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Abstract. Cryptographic primitives such as secure hash functions (e.g., SHA1, SHA2, and SHA3) and sy...
We give a polynomial time probabilistic algorithm that constructs an RSA modulus M=pl, where p and l...
This work presents mathematical properties of the RSA cryptosystem. The topics of backdoors and padd...
ABSTRACT. Two problems associated with RSA-encryption exponents are dis-cussed. Firstly, how many pl...
[[abstract]]LSBS-RSA denotes an RSA system with modulus primes, p and q , sharing a large number of ...
Abst rac t--A class of RSA encryption exponents whose corresponding decryption exponents have a bitl...
Abstract. RSA–CRT is the most widely used implementation for RSA signatures. However, determin-istic...
To speed up the RSA decryption one may try to use small secret decryption exponent d. However, in 19...
International audienceThe RSA cryptosystem comprises of two important features that are needed for e...