Better lattice constructions for solving multivariate linear equations modulo unknown divisors
DOI10.1007/978-3-642-39059-3_9zbMATH Open1316.94090OpenAlexW26461435MaRDI QIDQ5300940FDOQ5300940
Authors: Atsushi Takayasu, Noboru Kunihiro
Publication date: 28 June 2013
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-39059-3_9
Recommendations
- Solving linear equations modulo unknown divisors: revisited
- Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
- Probability method for cryptanalysis of general multivariate modular linear equation
- scientific article; zbMATH DE number 1303120
- Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
latticesRSAdigital signaturesCoppersmith's methodsmall rootsfault attacksimplicit factorizationmulti-prime \(\Phi \)-hiding assumption
Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Authentication, digital signatures and secret sharing (94A62)
Cited In (11)
- A Tool Kit for Partial Key Exposure Attacks on RSA
- Revisiting orthogonal lattice attacks on approximate common divisor problems
- Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
- Partial Key Exposure Attack on CRT-RSA
- Improving bounds on elliptic curve hidden number problem for ECDH key exchange
- Improved Results on Cryptanalysis of Prime Power RSA
- Partial key exposure attacks on Prime Power RSA with non-consecutive blocks
- Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
- Cryptanalysis of Prime Power RSA with two private exponents
- Small CRT-Exponent RSA Revisited
- A method for obtaining digital signatures and public-key cryptosystems
This page was built for publication: Better lattice constructions for solving multivariate linear equations modulo unknown divisors
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5300940)