Partial Exposure Attacks on a New RSA Variant
In 2022, Cotan and Teşeleanu presented a variant of the RSA cryptosystem where the modulus is of the form <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>N</mi><mo>=</mo><mi&...
| Published in: | Cryptography |
|---|---|
| Main Authors: | Mohammed Rahmani, Abderrahmane Nitaj, Mhammed Ziane |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-10-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2410-387X/8/4/44 |
Similar Items
Improved Cryptanalysis of Some RSA Variants
by: Mohammed Rahmani, et al.
Published: (2025-04-01)
by: Mohammed Rahmani, et al.
Published: (2025-04-01)
An Improved Attack on the RSA Variant Based on Cubic Pell Equation
by: Mohammed Rahmani, et al.
Published: (2025-06-01)
by: Mohammed Rahmani, et al.
Published: (2025-06-01)
Cryptanalysis of an RSA variant with moduli N=prql
by: Lu Yao, et al.
Published: (2017-06-01)
by: Lu Yao, et al.
Published: (2017-06-01)
On the Estimation of the k-RSA Attack
by: Anatoliy Sergeyevich Makeyev
Published: (2016-03-01)
by: Anatoliy Sergeyevich Makeyev
Published: (2016-03-01)
New partial key exposure attacks on RSA with additive exponent blinding
by: Ziming Jiang, et al.
Published: (2024-09-01)
by: Ziming Jiang, et al.
Published: (2024-09-01)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Wan Nur Aqlili Ruzai, et al.
Published: (2024-06-01)
by: Wan Nur Aqlili Ruzai, et al.
Published: (2024-06-01)
New approach of factoring the RSA cryptosystem
by: Nurul Nur Hanisah Adenan, et al.
Published: (2025-07-01)
by: Nurul Nur Hanisah Adenan, et al.
Published: (2025-07-01)
New Cryptanalysis of Prime Power RSA with Two Private Exponents
by: Shixiong Wang, et al.
Published: (2024-10-01)
by: Shixiong Wang, et al.
Published: (2024-10-01)
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems
by: George Teşeleanu
Published: (2024-12-01)
by: George Teşeleanu
Published: (2024-12-01)
About computational complexity of Dujella and Coppersmith attacks
by: Roman Damirovich Ginyatullin, et al.
Published: (2016-03-01)
by: Roman Damirovich Ginyatullin, et al.
Published: (2016-03-01)
An Attack Bound for Small Multiplicative Inverse of <i>φ</i>(<i>N</i>) mod <i>e</i> with a Composed Prime Sum <i>p</i> + <i>q</i> Using Sublattice Based Techniques
by: Pratha Anuradha Kameswari, et al.
Published: (2018-11-01)
by: Pratha Anuradha Kameswari, et al.
Published: (2018-11-01)
A note on the analysis of Herrmann–May lattices for small exponent RSA
by: Abul Kalam, et al.
Published: (2025-08-01)
by: Abul Kalam, et al.
Published: (2025-08-01)
A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA
by: İsrafil Okumuş, et al.
Published: (2024-12-01)
by: İsrafil Okumuş, et al.
Published: (2024-12-01)
A New RSA Variant Based on Elliptic Curves
by: Maher Boudabra, et al.
Published: (2023-07-01)
by: Maher Boudabra, et al.
Published: (2023-07-01)
An Improved Coppersmith Algorithm Based on Block Preprocessing
by: Lu Zhang, et al.
Published: (2024-01-01)
by: Lu Zhang, et al.
Published: (2024-01-01)
Safest-Value of the Number of Primes in RSA Modulus and an Improvised Generalized Multi-Moduli RSA
by: Jay Mehta, et al.
Published: (2025-05-01)
by: Jay Mehta, et al.
Published: (2025-05-01)
Asymptotic Bound for RSA Variant with Three Decryption Exponents
by: Amınu Alhajı Ibrahım, et al.
Published: (2023-04-01)
by: Amınu Alhajı Ibrahım, et al.
Published: (2023-04-01)
Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat
by: Aminudin, et al.
Published: (2021-08-01)
by: Aminudin, et al.
Published: (2021-08-01)
Analytical Comparison Of RSA And RSA With Chinese Remainder Theorem
by: Ankur Mantri, et al.
Published: (2016-07-01)
by: Ankur Mantri, et al.
Published: (2016-07-01)
Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis
by: Mengce Zheng, et al.
Published: (2024-12-01)
by: Mengce Zheng, et al.
Published: (2024-12-01)
RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol
by: Aminudin Aminudin, et al.
Published: (2020-04-01)
by: Aminudin Aminudin, et al.
Published: (2020-04-01)
Email Using Microsoft Message Queue and RSA Encryption Technique
by: Taif Sami Hassan
Published: (2012-08-01)
by: Taif Sami Hassan
Published: (2012-08-01)
Hardware modules of the RSA algorithm
by: Škobić Velibor, et al.
Published: (2014-01-01)
by: Škobić Velibor, et al.
Published: (2014-01-01)
Revisiting Small Private Key Attacks on Common Prime RSA
by: Mengce Zheng
Published: (2024-01-01)
by: Mengce Zheng
Published: (2024-01-01)
RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook
by: Konrad Kamiński, et al.
Published: (2023-11-01)
by: Konrad Kamiński, et al.
Published: (2023-11-01)
Concurrent factorization of RSA moduli via weak key equations
by: Wan Nur Aqlili Ruzai, et al.
Published: (2024-09-01)
by: Wan Nur Aqlili Ruzai, et al.
Published: (2024-09-01)
Simple Dynamic Threshold Decryption Based on CRT and RSA
by: Bartosz Nakielski, et al.
Published: (2023-06-01)
by: Bartosz Nakielski, et al.
Published: (2023-06-01)
A New Approach Combining RSA and ElGamal Algorithms: Advancements in Encryption and Digital Signatures Using Gaussian Integers
by: Yahia Awad, et al.
Published: (2025-03-01)
by: Yahia Awad, et al.
Published: (2025-03-01)
Revisiting the Polynomial-Time Equivalence of Computing the CRT-RSA Secret Key and Factoring
by: Mengce Zheng
Published: (2022-06-01)
by: Mengce Zheng
Published: (2022-06-01)
Early cup migration and wear as predictors for later aseptic loosening: a secondary evaluation of a randomized controlled RSA trial on cemented hip arthroplasties with 18-year follow-up
by: Håkon Greve Johannessen, et al.
Published: (2025-08-01)
by: Håkon Greve Johannessen, et al.
Published: (2025-08-01)
Generalization of RSA cryptosystem based on 2n primes
by: Tariq Shah, et al.
Published: (2023-06-01)
by: Tariq Shah, et al.
Published: (2023-06-01)
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
by: Aleksėjus Michalkovič, et al.
Published: (2023-11-01)
by: Aleksėjus Michalkovič, et al.
Published: (2023-11-01)
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
by: Aleksėjus Michalkovič, et al.
Published: (2023-11-01)
by: Aleksėjus Michalkovič, et al.
Published: (2023-11-01)
Factorization of big integer and the security of RSA
by: Yan-bing REN
Published: (2017-05-01)
by: Yan-bing REN
Published: (2017-05-01)
Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom
by: Cinantya Paramita, et al.
Published: (2021-06-01)
by: Cinantya Paramita, et al.
Published: (2021-06-01)
Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email
by: Albert Ginting, et al.
Published: (2015-04-01)
by: Albert Ginting, et al.
Published: (2015-04-01)
IMPLEMENTASI TEKNIK KRIPTOGRAFI RSA UNTUK PENGAMANAN DATA PENGIRIMAN SMS
by: Ainafatul Nur Muslika, et al.
Published: (2020-06-01)
by: Ainafatul Nur Muslika, et al.
Published: (2020-06-01)
On the quantum security of high-dimensional RSA protocol
by: Rahmani Nour-eddine, et al.
Published: (2024-11-01)
by: Rahmani Nour-eddine, et al.
Published: (2024-11-01)
PENERAPAN ALGORITMA ASIMETRIS RSA UNTUK KEAMANAN DATA PADA APLIKASI PENJUALAN CV. SINERGI COMPUTER LUBUKLINGGAU BERBASIS WEB
by: Susanto Susanto, et al.
Published: (2018-11-01)
by: Susanto Susanto, et al.
Published: (2018-11-01)
ACTIVE NETWORK SECURITY BASED RSA ALGORITHM
by: Ahmed Freidoon Fadhil, et al.
Published: (2009-12-01)
by: Ahmed Freidoon Fadhil, et al.
Published: (2009-12-01)
Similar Items
-
Improved Cryptanalysis of Some RSA Variants
by: Mohammed Rahmani, et al.
Published: (2025-04-01) -
An Improved Attack on the RSA Variant Based on Cubic Pell Equation
by: Mohammed Rahmani, et al.
Published: (2025-06-01) -
Cryptanalysis of an RSA variant with moduli N=prql
by: Lu Yao, et al.
Published: (2017-06-01) -
On the Estimation of the k-RSA Attack
by: Anatoliy Sergeyevich Makeyev
Published: (2016-03-01) -
New partial key exposure attacks on RSA with additive exponent blinding
by: Ziming Jiang, et al.
Published: (2024-09-01)
