We show it is possible to build an RSA-type cryptosystem by utilizing \textit{probable primes to base 2} numbers. Our modulus $N$ is the product $n\cdot m$ of such numbers (so here both prime and some composite, e.g. Carmichael or Fermat, numbers are acceptable) instead of prime numbers. Moreover, we require for $n$ and $m$ to be co-prime only, and so we don\u27t have to worry about whether any of the numbers $n, m$ is composite or not. The encryption and decryption processes are similar as those in the RSA. Hence, in this cryptosystem we may apply the above kind of numbers of arbitrary length being still sure that the system works well. The price for that is not so high: the size of a message $M$ (as a number) permitted by the new syst...
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to con...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus...
In applied cryptography, RSA is a typical asymmetric algorithm, which is used in electronic transact...
AbstractIt is shown that the popular RSA public key encryption scheme does not require two primes bu...
Public-key cryptography is rapidly becoming ubiquitous in many aspects of "electronic" lif...
RSA public keys are central to many cryptographic applications; hence their validity is of primary c...
In this paper, for given N = pq with p and q different odd primes, and m = 1, 2, · · · , we give ...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
With the increasing amount of information transmitted over networks, there is a need to be able to k...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
Cryptographic algorithms are oftenly based on large prime numbers. It is a difficult task to generat...
RSA key pairs are normally generated from two large primes p and q. We consider what happens if they...
Cryptography is the study of codes, as well as the art of writing and solving them. It has been a gr...
In this paper, we focus on the common prime RSA variant and introduces a novel investigation into th...
Abstract. This paper discusses the factorization of the RSA modulus N (i.e., N = pq, where p, q are ...
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to con...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus...
In applied cryptography, RSA is a typical asymmetric algorithm, which is used in electronic transact...
AbstractIt is shown that the popular RSA public key encryption scheme does not require two primes bu...
Public-key cryptography is rapidly becoming ubiquitous in many aspects of "electronic" lif...
RSA public keys are central to many cryptographic applications; hence their validity is of primary c...
In this paper, for given N = pq with p and q different odd primes, and m = 1, 2, · · · , we give ...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
With the increasing amount of information transmitted over networks, there is a need to be able to k...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
Cryptographic algorithms are oftenly based on large prime numbers. It is a difficult task to generat...
RSA key pairs are normally generated from two large primes p and q. We consider what happens if they...
Cryptography is the study of codes, as well as the art of writing and solving them. It has been a gr...
In this paper, we focus on the common prime RSA variant and introduces a novel investigation into th...
Abstract. This paper discusses the factorization of the RSA modulus N (i.e., N = pq, where p, q are ...
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to con...
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus...
In applied cryptography, RSA is a typical asymmetric algorithm, which is used in electronic transact...