Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cryptanalysis of the RSA variant based on cubic Pell equation
Abstract RSA (Rivest-Shamir-Adleman) cryptosystem is the most popular asymmetric key
cryptographic algorithm used in computer science and information security. Recently, an …
cryptographic algorithm used in computer science and information security. Recently, an …
Cryptanalysis of RSA variants with primes sharing most significant bits
We consider four variants of the RSA cryptosystem with an RSA modulus N= pq N= pq
where the public exponent e and the private exponent d satisfy an equation of the form ed …
where the public exponent e and the private exponent d satisfy an equation of the form ed …
On the improvement attack upon some variants of RSA cryptosystem via the continued fractions method
Let N= pq be an RSA modulus where p and q are primes not necessarily of the same bit
size. Previous cryptanalysis results on the difficulty of factoring the public modulus N= pq …
size. Previous cryptanalysis results on the difficulty of factoring the public modulus N= pq …
A security analysis of two classes of RSA-like cryptosystems
P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
A new attack on some RSA variants
Some variants of the RSA cryptosystem use a modulus of the form N= pq, a public exponent
e, and a private exponent d satisfying a key equation of the form ed− k (p 2− 1)(q 2− 1)= 1. In …
e, and a private exponent d satisfying a key equation of the form ed− k (p 2− 1)(q 2− 1)= 1. In …
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents
Partial key exposure attacks on RSA have been intensively studied by using lattice-based
Coppersmith's methods. Ernst et al.(Eurocrypt'05) studied the problem by considering three …
Coppersmith's methods. Ernst et al.(Eurocrypt'05) studied the problem by considering three …
A Lattice Attack Against a Family of RSA-Like Cryptosystems
G Teşeleanu - International Symposium on Cyber Security, Cryptology …, 2024 - Springer
Let N= pq be the product of two balanced prime numbers p and q. In 2002, Elkamchouchi,
Elshenawy, and Shaban introduced an interesting RSA-like cryptosystem that, unlike the …
Elshenawy, and Shaban introduced an interesting RSA-like cryptosystem that, unlike the …
A generalized attack on some variants of the RSA cryptosystem
Let N= pq be an RSA modulus with unknown factorization. The RSA cryptosystem can be
attacked by using the key equation ed-k (p-1)(q-1)= 1. Similarly, some variants of RSA, such …
attacked by using the key equation ed-k (p-1)(q-1)= 1. Similarly, some variants of RSA, such …
Small Private Key Attack Against a Family of RSA-like Cryptosystems
G Teseleanu, P Cotan - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Let $ N= pq $ be the product of two balanced prime numbers $ p $ and $ q $. Elkamchouchi,
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …
Further cryptanalysis of a type of RSA variants
G Shi, G Wang, D Gu - International Conference on Information Security, 2022 - Springer
To enhance the security or the efficiency of the standard RSA cryptosystem, some variants
have been proposed based on elliptic curves, Gaussian integers or Lucas sequences. A …
have been proposed based on elliptic curves, Gaussian integers or Lucas sequences. A …