Cryptanalysis of a New Variant of the RSA Cryptosystem

A Nitaj, NNH Adenan, MRK Ariffin - International Conference on …, 2024 - Springer
Let N= pq be an RSA modulus which is the product of two balanced prime factors. In 2018,
Murru and Saettone presented a variant of the RSA cryptosystem based on a cubic Pell …

[HTML][HTML] Partial Exposure Attacks on a New RSA Variant

M Rahmani, A Nitaj, M Ziane - Cryptography, 2024 - mdpi.com
In 2022, Cotan and Teşeleanu presented a variant of the RSA cryptosystem where the
modulus is of the form N= pq, and the private and the public exponents satisfy ed≡ 1 (mod …

Security issues of novel RSA variant

A Nitaj, MRBK Ariffin, NNH Adenan, TSC Lau… - IEEE …, 2022 - ieeexplore.ieee.org
The RSA is one of the current default cryptosystems that provides security with applications
such as encryptions and digital signatures. It is important to further study the weak …

A security analysis of two classes of RSA-like cryptosystems

P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …

Authenticated reversible image hiding algorithm based on blockchain technology

G Ye, Z Chen - Cluster Computing, 2025 - Springer
An authenticated reversible image hiding algorithm based on blockchain framework is
presented in this paper. First, global eigenvalues of the plain image are extracted as …

Continued fractions applied to a family of RSA-like cryptosystems

P Cotan, G Teşeleanu - … Conference on Information Security Practice and …, 2022 - Springer
Let N= pq be the product of two balanced prime numbers p and q. Murru and Saettone
presented in 2017 an interesting RSA-like cryptosystem that uses the key equation ed-k (p …

Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis

M Zheng, H Kang - Cybersecurity, 2024 - Springer
The RSA (Rivest–Shamir–Adleman) cryptosystem is a widely used public-key cryptographic
algorithm in information systems and computer applications. With the advancement of lattice …

Further cryptanalysis of a type of RSA variants

G Shi, G Wang, D Gu - International Conference on Information Security, 2022 - Springer
To enhance the security or the efficiency of the standard RSA cryptosystem, some variants
have been proposed based on elliptic curves, Gaussian integers or Lucas sequences. A …

Improving small private exponent attack on the Murru-Saettone cryptosystem

DI Nassr, M Anwar, HM Bahig - Theoretical Computer Science, 2022 - Elsevier
Abstract The Murru-Saettone cryptosystem is an RSA-like cryptosystem constructed from a
particular group with a non-standard product in a cubic field related to the general cubic form …

Partial prime factor exposure attacks on some RSA variants

Y Feng, A Nitaj, Y Pan - Theoretical Computer Science, 2024 - Elsevier
In this paper, we consider five variants of the RSA cryptosystem, where the modulus is N=
pq, and the public key e and the secret key d satisfy ed− k (p 2+ p+ 1)(q 2+ q+ 1)= 1 or ed− k …