Cryptanalysis of the RSA variant based on cubic Pell equation

M Zheng, N Kunihiro, Y Yao - Theoretical Computer Science, 2021 - Elsevier
Abstract RSA (Rivest-Shamir-Adleman) cryptosystem is the most popular asymmetric key
cryptographic algorithm used in computer science and information security. Recently, an …

Cryptanalysis of RSA variants with primes sharing most significant bits

M Cherkaoui-Semmouni, A Nitaj, W Susilo… - Information Security: 24th …, 2021 - Springer
We consider four variants of the RSA cryptosystem with an RSA modulus N= pq N= pq
where the public exponent e and the private exponent d satisfy an equation of the form ed …

On the improvement attack upon some variants of RSA cryptosystem via the continued fractions method

WNA Ruzai, MRK Ariffin, MA Asbullah, Z Mahad… - IEEE …, 2020 - ieeexplore.ieee.org
Let N= pq be an RSA modulus where p and q are primes not necessarily of the same bit
size. Previous cryptanalysis results on the difficulty of factoring the public modulus N= pq …

A security analysis of two classes of RSA-like cryptosystems

P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …

A new attack on some RSA variants

A Nitaj, W Susilo, J Tonien - Theoretical Computer Science, 2023 - Elsevier
Some variants of the RSA cryptosystem use a modulus of the form N= pq, a public exponent
e, and a private exponent d satisfying a key equation of the form ed− k (p 2− 1)(q 2− 1)= 1. In …

Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents

K Suzuki, A Takayasu, N Kunihiro - Theoretical Computer Science, 2020 - Elsevier
Partial key exposure attacks on RSA have been intensively studied by using lattice-based
Coppersmith's methods. Ernst et al.(Eurocrypt'05) studied the problem by considering three …

A Lattice Attack Against a Family of RSA-Like Cryptosystems

G Teşeleanu - International Symposium on Cyber Security, Cryptology …, 2024 - Springer
Let N= pq be the product of two balanced prime numbers p and q. In 2002, Elkamchouchi,
Elshenawy, and Shaban introduced an interesting RSA-like cryptosystem that, unlike the …

A generalized attack on some variants of the RSA cryptosystem

A Nitaj, Y Pan, J Tonien - International Conference on Selected Areas in …, 2018 - Springer
Let N= pq be an RSA modulus with unknown factorization. The RSA cryptosystem can be
attacked by using the key equation ed-k (p-1)(q-1)= 1. Similarly, some variants of RSA, such …

Small Private Key Attack Against a Family of RSA-like Cryptosystems

G Teseleanu, P Cotan - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Let $ N= pq $ be the product of two balanced prime numbers $ p $ and $ q $. Elkamchouchi,
Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses …

Further cryptanalysis of a type of RSA variants

G Shi, G Wang, D Gu - International Conference on Information Security, 2022 - Springer
To enhance the security or the efficiency of the standard RSA cryptosystem, some variants
have been proposed based on elliptic curves, Gaussian integers or Lucas sequences. A …