Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cryptanalysis of a New Variant of the RSA Cryptosystem
Let N= pq be an RSA modulus which is the product of two balanced prime factors. In 2018,
Murru and Saettone presented a variant of the RSA cryptosystem based on a cubic Pell …
Murru and Saettone presented a variant of the RSA cryptosystem based on a cubic Pell …
[HTML][HTML] Partial Exposure Attacks on a New RSA Variant
In 2022, Cotan and Teşeleanu presented a variant of the RSA cryptosystem where the
modulus is of the form N= pq, and the private and the public exponents satisfy ed≡ 1 (mod …
modulus is of the form N= pq, and the private and the public exponents satisfy ed≡ 1 (mod …
Security issues of novel RSA variant
The RSA is one of the current default cryptosystems that provides security with applications
such as encryptions and digital signatures. It is important to further study the weak …
such as encryptions and digital signatures. It is important to further study the weak …
A security analysis of two classes of RSA-like cryptosystems
P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
Authenticated reversible image hiding algorithm based on blockchain technology
G Ye, Z Chen - Cluster Computing, 2025 - Springer
An authenticated reversible image hiding algorithm based on blockchain framework is
presented in this paper. First, global eigenvalues of the plain image are extracted as …
presented in this paper. First, global eigenvalues of the plain image are extracted as …
Continued fractions applied to a family of RSA-like cryptosystems
P Cotan, G Teşeleanu - … Conference on Information Security Practice and …, 2022 - Springer
Let N= pq be the product of two balanced prime numbers p and q. Murru and Saettone
presented in 2017 an interesting RSA-like cryptosystem that uses the key equation ed-k (p …
presented in 2017 an interesting RSA-like cryptosystem that uses the key equation ed-k (p …
Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis
M Zheng, H Kang - Cybersecurity, 2024 - Springer
The RSA (Rivest–Shamir–Adleman) cryptosystem is a widely used public-key cryptographic
algorithm in information systems and computer applications. With the advancement of lattice …
algorithm in information systems and computer applications. With the advancement of lattice …
Further cryptanalysis of a type of RSA variants
G Shi, G Wang, D Gu - International Conference on Information Security, 2022 - Springer
To enhance the security or the efficiency of the standard RSA cryptosystem, some variants
have been proposed based on elliptic curves, Gaussian integers or Lucas sequences. A …
have been proposed based on elliptic curves, Gaussian integers or Lucas sequences. A …
Improving small private exponent attack on the Murru-Saettone cryptosystem
Abstract The Murru-Saettone cryptosystem is an RSA-like cryptosystem constructed from a
particular group with a non-standard product in a cubic field related to the general cubic form …
particular group with a non-standard product in a cubic field related to the general cubic form …
Partial prime factor exposure attacks on some RSA variants
In this paper, we consider five variants of the RSA cryptosystem, where the modulus is N=
pq, and the public key e and the secret key d satisfy ed− k (p 2+ p+ 1)(q 2+ q+ 1)= 1 or ed− k …
pq, and the public key e and the secret key d satisfy ed− k (p 2+ p+ 1)(q 2+ q+ 1)= 1 or ed− k …