A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding (Q6175989): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / cites work
 
Property / cites work: On bounded distance decoding with predicate: breaking the ``lattice barrier'' for the hidden number problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Lattice Construction for Partial Key Exposure Attack for RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking Exponent Blinding in RSA without CRT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249286 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage certification revisited: bounding model errors in side-channel security evaluations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal Correlation Analysis on Exponentiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding a Small Root of a Univariate Modular Equation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small solutions to polynomial equations, and low exponent RSA vulnerabilities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5326926 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attacks on RSA up to Full Size Exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power Attack on Small RSA Public Exponent / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5270493 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reconstructing RSA Private Keys from Random Key Bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Known–Plaintext–Only Attack on RSA–CRT with Montgomery Multiplication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4400575 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4787198 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure on RSA with Private Exponents Larger Than N / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425714 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Gradient Theory of Optimal Flight Paths / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Factoring polynomials with rational coefficients / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power Analysis Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial key exposure attack on short secret exponent CRT-RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5396710 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attack on CRT-RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536212 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic Number Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small CRT-exponent RSA revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797390 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Checking before output may not be enough against fault-based cryptanalysis / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 17:17, 2 August 2024

scientific article; zbMATH DE number 7730505
Language Label Description Also known as
English
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
scientific article; zbMATH DE number 7730505

    Statements

    A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding (English)
    0 references
    0 references
    0 references
    0 references
    21 August 2023
    0 references
    partial key exposure
    0 references
    additive blinding
    0 references
    CRT-RSA
    0 references
    Coppersmith method
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers