Small solutions to polynomial equations, and low exponent RSA vulnerabilities

From MaRDI portal
Publication:1382143

DOI10.1007/s001459900030zbMath0912.11056OpenAlexW2101040389WikidataQ54136651 ScholiaQ54136651MaRDI QIDQ1382143

Don Coppersmith

Publication date: 16 May 1999

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s001459900030




Related Items (only showing first 100 items - show all)

An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conicsSoK: how (not) to design and implement post-quantum cryptography(EC)DSA lattice attacks based on Coppersmith's methodA Unified Framework for Small Secret Exponent Attack on RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party SettingTowards faster polynomial-time lattice reductionFactoring multi-power RSA moduli with primes sharing least or most significant bitsTrapdoor DDH groups from pairings and isogeniesCryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reductionCryptanalysis of an RSA variant with moduli \(N=p^r q^l\)A note on the bivariate Coppersmith theoremAttacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationNew Multilinear Maps Over the IntegersCryptanalysis of the Co-ACD AssumptionClassical attacks on a variant of the RSA cryptosystemFactoring RSA moduli with primes sharing bits in the middleCryptanalysis of RSA variants with primes sharing most significant bitsRecovering zeros of polynomials modulo a primeAcoustic cryptanalysisEfficient cryptosystems from \(2^k\)-th power residue symbolsApproximate divisor multiples -- factoring with only a third of the secret CRT-exponentsA quasi quadratic time algorithm for hyperelliptic curve point countingInstantiability of RSA-OAEP under chosen-plaintext attackRevisiting approximate polynomial common divisor problem and noisy multipolynomial reconstructionPartial Key Exposure Attack on CRT-RSAA generalized attack on RSA type cryptosystemsFast rebalanced RSA signature scheme with typical prime generationComment on ``An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)New Attacks on RSA with Moduli N = p r qFactoring RSA Moduli with Weak Prime FactorsA New Partial Key Exposure Attack on Multi-power RSAImproving small private exponent attack on the Murru-Saettone cryptosystemFinding shortest lattice vectors faster using quantum searchAttacking the linear congruential generator on elliptic curves via lattice techniquesSmall secret exponent attack on RSA variant with modulus \(N=p^rq\)Cryptanalytic results on `Dual CRT' and `Common Prime' RSAEfficient RSA key generation and threshold Paillier in the two-party settingAnother Generalization of Wiener’s Attack on RSAOn the modular inversion hidden number problemCryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate PolynomialsA public key cryptosystem based on three new provable problemsThe better bound of private key in RSA with unbalanced primesGradual sub-lattice reduction and a new complexity for factoring polynomialsHow to fake an RSA signature by encoding modular root finding as a SAT problemMore constructions of lossy and correlation-secure trapdoor functionsSome lattice attacks on DSA and ECDSAExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsFactoring multi power RSA moduli with a class of secret exponentsOn oracle factoring of integersRecovering a sum of two squares decompositionOn reducing factorization to the discrete logarithm problem modulo a compositeA Tool Kit for Partial Key Exposure Attacks on RSAAn Improved Analysis on Three Variants of the RSA CryptosystemOn the security of multi-prime RSAImproved Results on Cryptanalysis of Prime Power RSARevisiting Wiener’s Attack – New Weak Keys in RSAFurther improvement of factoring \(N=p^rq^s\) with partial known bitsA generalized attack on some variants of the RSA cryptosystemPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundImplicit Related-Key Factorization Problem on the RSA CryptosystemCryptanalysis of the RSA variant based on cubic Pell equationApplication of ECM to a class of RSA keysImproved Cryptanalysis of the Multi-Prime φ - Hiding AssumptionCryptanalysis of Dual RSACombined Attack on CRT-RSAA new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSAOn the security of RSA with primes sharing least-significant bitsA new public key cryptosystem based on Edwards curvesSmall CRT-exponent RSA revisitedFast LLL-type lattice reductionSmallest Reduction Matrix of Binary Quadratic FormsPredicting nonlinear pseudorandom number generatorsCryptanalysis of RSA for a special case with \(d > e\)A method for obtaining digital signatures and public-key cryptosystemsSolving Linear Equations Modulo Divisors: On Factoring Given Any BitsFinding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystemCryptanalysis of RSA with two decryption exponentsPartial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsA new attack on RSA with two or three decryption exponentsAn exponent one-fifth algorithm for deterministic integer factorisationImproved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime FactorsIdeal forms of Coppersmith's theorem and Guruswami-Sudan list decodingCryptanalysis of elliptic curve hidden number problem from PKC 2017Towards Optimal Bounds for Implicit Factorization ProblemEfficient public key encryption with smallest ciphertext expansion from factoringInferring sequences produced by a linear congruential generator on elliptic curves missing high-order bitsSufficient conditions for factoring a class of large integersPartial Key Exposure Attacks on RSA with Multiple Exponent PairsA New Attack on Three Variants of the RSA CryptosystemCryptanalysis of RSA Using the Ratio of the PrimesAlgorithm for factoring some RSA and Rabin moduliSimplified High-Speed High-Distance List Decoding for Alternant CodesGeneralized cryptanalysis of small CRT-exponent RSAA deterministic algorithm for finding \(r\)-power divisorsThe multi-dimension RSA and its low exponent securityFast reduction of algebraic lattices over cyclotomic fieldsFormally verified certificate checkers for hardest-to-round computationRevisiting prime power RSAA new attack on RSA and Demytko’s elliptic curve cryptosystemForty years of attacks on the RSA cryptosystem: A brief survey




This page was built for publication: Small solutions to polynomial equations, and low exponent RSA vulnerabilities