Cryptanalysis of short RSA secret exponents

From MaRDI portal
Publication:3483214

DOI10.1109/18.54902zbMath0703.94004OpenAlexW2166780626WikidataQ55899583 ScholiaQ55899583MaRDI QIDQ3483214

Michael J. Wiener

Publication date: 1990

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/80c886fd6bcdd4605b22a42da8b21bc864ca357c



Related Items

An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics, A Unified Framework for Small Secret Exponent Attack on RSA, Reducing the Key Size of Rainbow Using Non-commutative Rings, A new fast modular arithmetic method in public key cryptography, Cryptanalysis of Prime Power RSA with two private exponents, An active attack on protocols for server-aided RSA signature computation, On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA, Attacks on Shamir's `RSA for paranoids', Attacking RSA Using an Arbitrary Parameter, Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\), Primes in quadratic unique factorization domains, Classical attacks on a variant of the RSA cryptosystem, Factoring RSA moduli with primes sharing bits in the middle, Cryptanalysis of RSA variants with primes sharing most significant bits, A variant of Wiener's attack on RSA, Batch RSA, A semantically secure public key cryptoscheme using bit-pair shadows, A provably secure non-iterative hash function resisting birthday attack, A New Non-Merkle-Damgård Structural Hash Function with Provable Security, Mathematical problems in cryptology, Exploiting the security of N = prqs through approximation of ϕ(N), Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices, Partial Key Exposure Attack on CRT-RSA, A generalized attack on RSA type cryptosystems, Fast rebalanced RSA signature scheme with typical prime generation, Comment on ``An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC), New Attacks on RSA with Moduli N = p r q, Factoring RSA Moduli with Weak Prime Factors, A New Partial Key Exposure Attack on Multi-power RSA, Improving small private exponent attack on the Murru-Saettone cryptosystem, Small secret exponent attack on RSA variant with modulus \(N=p^rq\), A new attack on some RSA variants, Cryptanalytic results on `Dual CRT' and `Common Prime' RSA, Practical attacks on small private exponent RSA: new records and new insights, Continued fractions applied to a family of RSA-like cryptosystems, Further cryptanalysis of a type of RSA variants, Another Generalization of Wiener’s Attack on RSA, A public key cryptosystem based on three new provable problems, Partial key exposure attack on short secret exponent CRT-RSA, Cryptanalysis of the multi-power RSA cryptosystem variant, The better bound of private key in RSA with unbalanced primes, Improved cryptanalysis of the multi-power RSA cryptosystem variant, Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents, An Improved Analysis on Three Variants of the RSA Cryptosystem, On the security of multi-prime RSA, Improved Results on Cryptanalysis of Prime Power RSA, Revisiting Wiener’s Attack – New Weak Keys in RSA, Cryptanalysis of short secret exponents modulo RSA primes., A generalized attack on some variants of the RSA cryptosystem, Large decryption exponents in RSA, Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound, Cryptanalysis of the RSA variant based on cubic Pell equation, A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations, Application of ECM to a class of RSA keys, Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design, Cryptanalysis of Dual RSA, Coppersmith's lattices and ``focus groups: an attack on small-exponent RSA, A new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSA, Common modulus attacks on small private exponent RSA and some fast variants (in practice), Small CRT-Exponent RSA Revisited, On the number of sparse RSA exponents, Small CRT-exponent RSA revisited, Unnamed Item, Speeding up exponentiation using an untrusted computational resource, The improved QV signature scheme based on conic curves over \(\mathbb Z_n\), Cryptanalysis of RSA for a special case with \(d > e\), A method for obtaining digital signatures and public-key cryptosystems, Using LLL-Reduction for Solving RSA and Factorization Problems, Finding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystem, Cryptanalysis of RSA with two decryption exponents, Cryptanalysis of RSA with more than one decryption exponent, Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents, A new attack on RSA with two or three decryption exponents, Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors, Cryptographic Hash Functions and Expander Graphs: The End of the Story?, Об обобщении метода Дюжелла, CRYPTANALYSIS OF RSA WITH CONSTRAINED KEYS, Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs, A New Attack on Three Variants of the RSA Cryptosystem, Cryptanalysis of RSA Using the Ratio of the Primes, A cubic analogue of the RSA cryptosystem, Partial Key Exposure: Generalized Framework to Attack RSA, Generalized cryptanalysis of small CRT-exponent RSA, Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, A small secret exponent attack on cryptosystems using Dickson polynomials, A New Class of Weak Encryption Exponents in RSA, Cryptanalysis of large RSA exponent by using the LLL algorithm, Unnamed Item, A novel cryptosystem based on grey system theory and genetic algorithm, The multi-dimension RSA and its low exponent security, A Unified Method for Private Exponent Attacks on RSA Using Lattices, Closed form expressions for two harmonic continued fractions, Security pitfalls of an efficient threshold proxy signature scheme for mobile agents, Cryptanalysis of RSA with a small parameter revisited, Revisiting prime power RSA, A new attack on RSA and Demytko’s elliptic curve cryptosystem, Forty years of attacks on the RSA cryptosystem: A brief survey