Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
The efficiency of attacking methods on secure RSA modulus was investigated.It was pointed out by analysis that since the success probability of some attack methods was neglectable,these methods could not be regarded as the reason for choosing strongly secure RSA modulus.In consideration of the analy...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | JIANG Zheng-tao1, HUAI Jin-peng2, WANG Yu-min4 |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2009-01-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails?columnId=74652303&Fpath=home&index=0 |
Similar Items
Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
by: JIANG Zheng-tao1, et al.
Published: (2009-01-01)
by: JIANG Zheng-tao1, et al.
Published: (2009-01-01)
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems
by: George Teşeleanu
Published: (2024-12-01)
by: George Teşeleanu
Published: (2024-12-01)
Safest-Value of the Number of Primes in RSA Modulus and an Improvised Generalized Multi-Moduli RSA
by: Jay Mehta, et al.
Published: (2025-05-01)
by: Jay Mehta, et al.
Published: (2025-05-01)
Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat
by: Aminudin, et al.
Published: (2021-08-01)
by: Aminudin, et al.
Published: (2021-08-01)
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
by: Fanyu KONG, et al.
Published: (2019-02-01)
by: Fanyu KONG, et al.
Published: (2019-02-01)
Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm
by: Sadiel de la Fe, et al.
Published: (2021-11-01)
by: Sadiel de la Fe, et al.
Published: (2021-11-01)
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT
by: Sitalakshmi Venkatraman, et al.
Published: (2019-08-01)
by: Sitalakshmi Venkatraman, et al.
Published: (2019-08-01)
Insecurity of Chait et al.’s RSA-Based Aggregate Signature Scheme
by: Chanhyeok Park, et al.
Published: (2024-01-01)
by: Chanhyeok Park, et al.
Published: (2024-01-01)
Estudio exploratorio de la técnicaTimming Attack en el criptosistema RSA
by: Francisco Bolaños Burgos, et al.
Published: (2016-11-01)
by: Francisco Bolaños Burgos, et al.
Published: (2016-11-01)
Research of the small Qubit quantum computing attack to the RSA public key cryptography
by: Bao-nan WANG, et al.
Published: (2017-10-01)
by: Bao-nan WANG, et al.
Published: (2017-10-01)
RSA modulus length regression prediction based on the Run Test and machine learning in the ciphertext-only scenarios
by: Ke Yuan, et al.
Published: (2025-07-01)
by: Ke Yuan, et al.
Published: (2025-07-01)
Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis
by: Mengce Zheng, et al.
Published: (2024-12-01)
by: Mengce Zheng, et al.
Published: (2024-12-01)
New partial key exposure attacks on RSA with additive exponent blinding
by: Ziming Jiang, et al.
Published: (2024-09-01)
by: Ziming Jiang, et al.
Published: (2024-09-01)
Revisiting Small Private Key Attacks on Common Prime RSA
by: Mengce Zheng
Published: (2024-01-01)
by: Mengce Zheng
Published: (2024-01-01)
Partial Key Attack Given MSBs of CRT-RSA Private Keys
by: Amir Hamzah Abd Ghafar, et al.
Published: (2020-12-01)
by: Amir Hamzah Abd Ghafar, et al.
Published: (2020-12-01)
Approach to making strategies for network security enhancement based on attack graphs
by: SI Jia-quan1, et al.
Published: (2009-01-01)
by: SI Jia-quan1, et al.
Published: (2009-01-01)
Approach to making strategies for network security enhancement based on attack graphs
by: SI Jia-quan1, et al.
Published: (2009-01-01)
by: SI Jia-quan1, et al.
Published: (2009-01-01)
Factorization of big integer and the security of RSA
by: Yan-bing REN
Published: (2017-05-01)
by: Yan-bing REN
Published: (2017-05-01)
IMPLEMENTASI TEKNIK KRIPTOGRAFI RSA UNTUK PENGAMANAN DATA PENGIRIMAN SMS
by: Ainafatul Nur Muslika, et al.
Published: (2020-06-01)
by: Ainafatul Nur Muslika, et al.
Published: (2020-06-01)
ACTIVE NETWORK SECURITY BASED RSA ALGORITHM
by: Ahmed Freidoon Fadhil, et al.
Published: (2009-12-01)
by: Ahmed Freidoon Fadhil, et al.
Published: (2009-12-01)
An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
by: Basheer Riskhan, et al.
Published: (2023-07-01)
by: Basheer Riskhan, et al.
Published: (2023-07-01)
Method to generate attack graphs for assessing the overall security of networks
by: MAN Da-peng1, et al.
Published: (2009-01-01)
by: MAN Da-peng1, et al.
Published: (2009-01-01)
Method to generate attack graphs for assessing the overall security of networks
by: MAN Da-peng1, et al.
Published: (2009-01-01)
by: MAN Da-peng1, et al.
Published: (2009-01-01)
Improvement in RSA Cryptosystem
by: Seema Verma, et al.
Published: (2011-08-01)
by: Seema Verma, et al.
Published: (2011-08-01)
Automatic Classification of Attacks on IP Telephony
by: Jakub Safarik, et al.
Published: (2013-01-01)
by: Jakub Safarik, et al.
Published: (2013-01-01)
Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks
by: Khalid Saeed, et al.
Published: (2023-03-01)
by: Khalid Saeed, et al.
Published: (2023-03-01)
A phishing attack awareness framework for a South African University of Technology
by: Japhet M. Kayomb, et al.
Published: (2025-07-01)
by: Japhet M. Kayomb, et al.
Published: (2025-07-01)
A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA
by: İsrafil Okumuş, et al.
Published: (2024-12-01)
by: İsrafil Okumuş, et al.
Published: (2024-12-01)
An Analysis of Neighbor Discovery Protocol Attacks
by: Firas Najjar, et al.
Published: (2023-06-01)
by: Firas Najjar, et al.
Published: (2023-06-01)
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles
by: Yaling Zhu, et al.
Published: (2024-03-01)
by: Yaling Zhu, et al.
Published: (2024-03-01)
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation
by: Kotaro Saito, et al.
Published: (2022-08-01)
by: Kotaro Saito, et al.
Published: (2022-08-01)
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation
by: Kotaro Saito, et al.
Published: (2022-08-01)
by: Kotaro Saito, et al.
Published: (2022-08-01)
Security Vulnerabilities in LPWANs—An Attack Vector Analysis for the IoT Ecosystem
by: Nuno Torres, et al.
Published: (2021-04-01)
by: Nuno Torres, et al.
Published: (2021-04-01)
Research on network attack analysis method based on attack graph of absorbing Markov chain
by: Haiyan KANG, et al.
Published: (2023-02-01)
by: Haiyan KANG, et al.
Published: (2023-02-01)
Research on network attack analysis method based on attack graph of absorbing Markov chain
by: Haiyan KANG, et al.
Published: (2023-02-01)
by: Haiyan KANG, et al.
Published: (2023-02-01)
On the Estimation of the k-RSA Attack
by: Anatoliy Sergeyevich Makeyev
Published: (2016-03-01)
by: Anatoliy Sergeyevich Makeyev
Published: (2016-03-01)
Partial Exposure Attacks on a New RSA Variant
by: Mohammed Rahmani, et al.
Published: (2024-10-01)
by: Mohammed Rahmani, et al.
Published: (2024-10-01)
On Power-Off Temperature Attacks Potential Against Security Sensors
by: Maryam Esmaeilian, et al.
Published: (2025-03-01)
by: Maryam Esmaeilian, et al.
Published: (2025-03-01)
WEB ATTACKS AND DEFENSES
by: Ammar A. Alobaidi, et al.
Published: (2023-06-01)
by: Ammar A. Alobaidi, et al.
Published: (2023-06-01)
BlueLock a tool to prevent Bluetooth attacks
by: Gerardo Alberto Castang Montiel, et al.
Published: (2020-01-01)
by: Gerardo Alberto Castang Montiel, et al.
Published: (2020-01-01)
Similar Items
-
Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
by: JIANG Zheng-tao1, et al.
Published: (2009-01-01) -
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems
by: George Teşeleanu
Published: (2024-12-01) -
Safest-Value of the Number of Primes in RSA Modulus and an Improvised Generalized Multi-Moduli RSA
by: Jay Mehta, et al.
Published: (2025-05-01) -
Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat
by: Aminudin, et al.
Published: (2021-08-01) -
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
by: Fanyu KONG, et al.
Published: (2019-02-01)
