A new attack on RSA and Demytko's elliptic curve cryptosystem
DOI10.1080/09720529.2019.1587827zbMATH Open1495.94065OpenAlexW2941958523WikidataQ127996937 ScholiaQ127996937MaRDI QIDQ5030488FDOQ5030488
Authors: Abderrahmane Nitaj, Emmanuel Fouotsa
Publication date: 17 February 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://hal-normandie-univ.archives-ouvertes.fr/hal-02321003/file/RSAVariantsDemyt2019.pdf
Recommendations
Cryptography (94A60) Diophantine approximation in probabilistic number theory (11K60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Elliptic curves (14H52)
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Factoring integers with elliptic curves
- Factoring polynomials with rational coefficients
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- Cryptanalysis of short RSA secret exponents
- Title not available (Why is that?)
- New directions in cryptography
- Title not available (Why is that?)
- On the number of positive integers \(\leq x\) and free of prime factors \(>y\)
- Title not available (Why is that?)
- Elliptic Curve Cryptosystems
- Title not available (Why is that?)
- Cryptanalysis of RSA with Private Key d Less than N 0.292
- Toward a Rigorous Variation of Coppersmith’s Algorithm on Three Variables
- Cryptanalysis of RSA and its variants.
- Title not available (Why is that?)
- Papers from the conference 21st Journées Arithmétiques held at the Università Lateranense, Rome, July 12--16, 2001
- Parallelizing pairings on Hessian elliptic curves
- Another Generalization of Wiener’s Attack on RSA
- Public Key Cryptography – PKC 2004
- A theta model for elliptic curves
Cited In (14)
- Algorithms for elliptic curves
- A generalized attack on some variants of the RSA cryptosystem
- New Attacks on the RSA Cryptosystem
- A generalized attack on RSA type cryptosystems
- Title not available (Why is that?)
- A New Attack on RSA and CRT-RSA
- Design and implementation of a system that preserves the confidentiality of stream cipher in non-linear flow coding
- Finding points on elliptic curves with Coppersmith's method
- Application of ECM to a class of RSA keys
- Complete addition formulas on the level four theta model of elliptic curves
- How to choose secret parameters for RSA-type cryptosystems over elliptic curves
- Elliptic divisibility sequences over the Edwards model of elliptic curves
- Pollard's rho attack on ECDLP and Threshold Schemes
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
This page was built for publication: A new attack on RSA and Demytko's elliptic curve cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5030488)