Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Public exponent"'
Autor:
Emmanuel Fouotsa, Abderrahmane Nitaj
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography
Journal of Discrete Mathematical Sciences and Cryptography, non, 2019, ⟨10.1080/09720529.2019.1587827⟩
Journal of Discrete Mathematical Sciences and Cryptography, non, 2019, ⟨10.1080/09720529.2019.1587827⟩
International audience; Let N = pq be an RSA modulus and e be a public exponent. Numerous attacks on RSA exploit the arithmetical properties of the key equation ed − k(p − 1)(q − 1) = 1. In this paper, we study the more general equation eu −
Publikováno v:
Information Security Conference (ISC 2021)
Information Security Conference (ISC 2021), Nov 2021, Bali, Indonesia
Lecture Notes in Computer Science ISBN: 9783030913557
Information Security Conference (ISC 2021), Nov 2021, Bali, Indonesia
Lecture Notes in Computer Science ISBN: 9783030913557
International audience; We consider four variants of the RSA cryptosystem with an RSA modulus N = pq where the public exponent e and the private exponent d satisfy an equation of the form ed − k (p^2 − 1)( q^2 − 1 )= 1. We show that, if the pri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2cb7dbd9272730690c49e333bc5a9011
https://hal.archives-ouvertes.fr/hal-03437901
https://hal.archives-ouvertes.fr/hal-03437901
Autor:
Barać, Marko
Kriptosustavi s javnim ključem su važni u kriptografiji jer je ključ za šifriranje javno dostupan, to jest nema potrebe za prethodnom razmjenom tajnih ključeva. Prvi i najpopularniji kriptosustav s javnim ključem je RSA kriptosustav čija je si
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::c6cefbe0a19f9423e605af02f7d59df0
https://repozitorij.svkst.unist.hr/islandora/object/pmfst:1183/datastream/PDF
https://repozitorij.svkst.unist.hr/islandora/object/pmfst:1183/datastream/PDF
Publikováno v:
Computer Standards & Interfaces. 74:103470
RSA is a well known standard algorithm used by modern computers to encrypt and decrypt messages. In some applications, to save the decryption time, it is desirable to have a short secret key d compared to the modulus N. The first significant attack t
Autor:
Xianmeng Meng, Xuexin Zheng
Publikováno v:
Information Processing Letters. 115:858-862
Let N = p q be an RSA modulus with balanced primes p and q. Suppose that the public exponent e and private exponent d satisfy ed - 1 = k ? ( N ) . We revisit the birthday attack against short exponent RSA proposed by Meng and Zheng at ACISP 2012. We
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Daniel R. L. Brown
Publikováno v:
Journal of Cryptology. 29:220-241
If factoring is hard, this paper shows that straight line programs cannot efficiently solve the low public exponent RSA problem. More precisely, no efficient algorithm can take an RSA public key as input and then output a straight line program that e
Publikováno v:
International Journal of Computer Applications. 49:39-42
Boneh-Durfee extended the bound for low private exponent from 0.25 (provided by wiener) to 0.292 with public exponent size is same as modulus size. They have used powerful lattice reduction algorithm (LLL) with coppersmith's theory of polynomials. In
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :912-918
In some applications, a short private exponent d is chosen to improve the decryption or signing process for RSA public key cryptosystem. However, in a typical RSA, if the private exponent d is selected first, the public exponent e should be of the sa
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :2326-2332
This investigation proposes two methods for embedding backdoors in the RSA modulus N=pq rather than in the public exponent e. This strategy not only permits manufacturers to embed backdoors in an RSA system, but also allows users to choose any desire