Classical Attacks on a Variant of the RSA Cryptosystem (original) (raw)

A New Attack on Three Variants of the RSA Cryptosystem

Martin Bunder

Lecture Notes in Computer Science, 2016

View PDFchevron_right

A new attack on the RSA cryptosystem based on continued fractions

Martin Bunder

2017

View PDFchevron_right

Revisiting Wiener’s Attack – New Weak Keys in RSA

Subhamoy Maitra

Lecture Notes in Computer Science

View PDFchevron_right

Security Issues of Novel RSA Variant

Nurul Adenan

IEEE Access

View PDFchevron_right

A generalized attack on RSA type cryptosystems

Martin Bunder

Theoretical Computer Science

View PDFchevron_right

Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves

Martin Bunder

Journal of Information Security and Applications

View PDFchevron_right

New Cryptanalytic Attack on RSA Modulus N=pq Using Small Prime Difference Method

Saidu Muhammad Abubakar

Cryptography, 2018

View PDFchevron_right

New attacks on prime power N = prq using good approximation of φ(N)

SADIQ SHEHU

2017

View PDFchevron_right

New attacks on RSA with Moduli N = pq

Tajjeeddine Rachidi

2016

View PDFchevron_right

New Attacks on the RSA Cryptosystem

Muhammad Rezal

Progress in Cryptology – AFRICACRYPT 2014, 2014

View PDFchevron_right

Common modulus attacks on small private exponent RSA and some fast variants (in practice)

Charles Lam

Journal of Mathematical Cryptology, 2010

View PDFchevron_right

New attacks on RSA with Moduli N = prq

Tajjeeddine Rachidi

2016

View PDFchevron_right

Cryptanalysis Attacks on RSA

Chawanangwa Lupafya

2013

View PDFchevron_right

A new attack on RSA and Demytko’s elliptic curve cryptosystem

emmanuel Fouotsa

Journal of Discrete Mathematical Sciences and Cryptography

View PDFchevron_right

Study of RSA and Proposed Variant against Wiener's Attack

Justin Jose

International Journal of Computer Applications, 2010

View PDFchevron_right

New cryptanalytic results upon prime power moduli N = prq

SADIQ SHEHU

PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND TECHNOLOGY 2018 (MATHTECH2018): Innovative Technologies for Mathematics & Mathematics for Technological Innovation

View PDFchevron_right

Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99

Phong Nguyen

International Conference on the Theory and Application of Cryptology and Information Security, 2000

View PDFchevron_right

Short private exponent attacks on fast variants of RSA

Jean-jacques Quisquater

2002

View PDFchevron_right

A variant of Wiener's attack on RSA with small secret exponent

Andrej Dujella

ACM Communications in Computer Algebra, 2008

View PDFchevron_right

On the improvement of Wiener attack on RSA with small private exponent

Yue-Hsun Lin

TheScientificWorldJournal, 2014

View PDFchevron_right

Cryptanalysis of RSA: A Special Case of Boneh-Durfee's Attack

Majid Mumtaz

IACR Cryptol. ePrint Arch., 2020

View PDFchevron_right

On Some Attacks on Multi-prime RSA

yi king low

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference

Mengce Zheng

Information Security and Privacy, 2017

View PDFchevron_right

A New Factoring Attack on Multi-Prime RSA with Small Prime Difference

Mengce Zheng

IACR Cryptol. ePrint Arch., 2015

View PDFchevron_right

Forty years of attacks on the RSA cryptosystem: A brief survey

MAJID MUMTAZ

Journal of Discrete Mathematical Sciences and Cryptography, 2019

View PDFchevron_right

Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy

Nurul Adenan

PLOS ONE, 2021

View PDFchevron_right

A New Partial Key Exposure Attack on Multi-power RSA

Mehmet Sabir Kiraz

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Attack on RSA Cryptosystem

sachin Upadhyay

ijser.org

View PDFchevron_right

The effectiveness of lattice attacks against low-exponent RSA (Coupé, C., Nguyen, P. & Stern, J.)

Christophe Coupé

Proceedings of Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, H. Imai and Y. Zheng (Eds.), Volume 1560 of Lecture Notes in Computer Science , 1999

View PDFchevron_right

New Jochemsz–May Cryptanalytic Bound for RSA System Utilizing Common Modulus N = p2q

hanisah adenan

Mathematics

View PDFchevron_right