Cryptanalysis of RSA with more than one decryption exponent
From MaRDI portal
Publication:991798
DOI10.1016/J.IPL.2010.02.016zbMATH Open1211.94037OpenAlexW1982156312MaRDI QIDQ991798FDOQ991798
Authors: Santanu Sarkar, Subhamoy Maitra
Publication date: 7 September 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2010.02.016
Recommendations
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Factoring polynomials with rational coefficients
- Cryptanalysis of short RSA secret exponents
- Cryptanalysis of RSA with private key d less than N/sup 0.292/
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
- Title not available (Why is that?)
- Cryptanalysis of RSA with two decryption exponents
Cited In (17)
- Generalized cryptanalysis of small CRT-exponent RSA
- Cryptanalysis of large RSA exponent by using the LLL algorithm
- On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA
- Partial key exposure attacks on RSA with multiple exponent pairs
- Large decryption exponents in RSA
- Further cryptanalysis of a type of RSA variants
- Cryptanalysis of `less short' RSA secret exponents
- Partial key exposure: generalized framework to attack RSA
- Continued fractions applied to a family of RSA-like cryptosystems
- Cryptanalysis of RSA with two decryption exponents
- Cryptanalysis of RSA for a special case with \(d > e\)
- A security analysis of two classes of RSA-like cryptosystems
- A new attack on RSA with two or three decryption exponents
- Cryptanalysis of RSA with multiple small secret exponents
- Cryptanalysis of variants of RSA with multiple small secret exponents
- The multi-dimension RSA and its low exponent security
- Cryptanalysis of the multi-power RSA cryptosystem variant
This page was built for publication: Cryptanalysis of RSA with more than one decryption exponent
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q991798)