2023
DOI: 10.1016/j.tcs.2023.113898
|View full text |Cite
|
Sign up to set email alerts
|

A new attack on some RSA variants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Micheli [18] provided relevant examples pertaining to key recovery in situations involving the partial leakage of information for these types of cryptographic problems. In recent years, the Coppersmith algorithm has remained one of the most important algorithms for analyzing RSA and its variants [19]. In addition, it has also been used to solve the sum of EC-HNP problems under certain conditions [20] and factorization problems when a sufficient number of bits of the prime factors are known [21].…”
Section: Introductionmentioning
confidence: 99%
“…Micheli [18] provided relevant examples pertaining to key recovery in situations involving the partial leakage of information for these types of cryptographic problems. In recent years, the Coppersmith algorithm has remained one of the most important algorithms for analyzing RSA and its variants [19]. In addition, it has also been used to solve the sum of EC-HNP problems under certain conditions [20] and factorization problems when a sufficient number of bits of the prime factors are known [21].…”
Section: Introductionmentioning
confidence: 99%