Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents
From MaRDI portal
Publication:2202020
DOI10.1016/j.tcs.2020.07.004zbMath1458.94282OpenAlexW3043187028MaRDI QIDQ2202020
Kaichi Suzuki, Noboru Kunihiro, Atsushi Takayasu
Publication date: 17 September 2020
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2020.07.004
Related Items (3)
Breaking Goppa-based McEliece with hints ⋮ Decoding McEliece with a hint -- secret Goppa key parts reveal everything ⋮ Cryptanalysis of the RSA variant based on cubic Pell equation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Revisiting prime power RSA
- Small secret exponent attack on RSA variant with modulus \(N=p^rq\)
- Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2--5, 2009. Proceedings
- Factoring polynomials with rational coefficients
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- Cryptanalysis of RSA variants with modified Euler quotient
- Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound
- On the optimality of lattices for the Coppersmith technique
- Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits
- Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
- Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
- How to Generalize RSA Cryptanalyses
- Solving Linear Equations Modulo Unknown Divisors: Revisited
- Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
- Finding a Small Root of a Univariate Modular Equation
- Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
- A New Partial Key Exposure Attack on Multi-power RSA
- A Tool Kit for Partial Key Exposure Attacks on RSA
- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions
- Cryptanalysis of short RSA secret exponents
- On the security of multi-prime RSA
- Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
- A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073
- A New Lattice Construction for Partial Key Exposure Attack for RSA
- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
- Cryptanalysis of RSA with private key d less than N/sup 0.292/
- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
- Partial Key Exposure Attacks on Takagi’s Variant of RSA
- New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
- Cryptanalysis of RSA with Multiple Small Secret Exponents
- Using LLL-Reduction for Solving RSA and Factorization Problems
- Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith’s Technique and Applications to RSA
- Partial Key Exposure Attacks on RSA up to Full Size Exponents
- Advances in Cryptology - CRYPTO 2003
- Small Secret Key Attack on a Variant of RSA (Due to Takagi)
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
- Small CRT-Exponent RSA Revisited
- Public Key Cryptography - PKC 2006
This page was built for publication: Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents