Partial key exposure attacks on CRT-RSA: Better cryptanalysis to full size encryption exponents

10Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

There have been several papers which studied the security of CRT-RSA when some bits of CRT-exponents dp and dq are known to attackers. At first, Blömer and May (Crypto 2003) proposed attacks which used the most or the least significant bits of either dp or dq. Next, Sarkar and Maitra (ACNS 2009) generalized the scenario and proposed an attack which used the most significant bits of both dp and dq. Recently, Lu et al. (ACNS 2014) proposed improved attacks for the same scenario as Blömer and May. These works showed that public RSA modulus can be factored when e

Cite

CITATION STYLE

APA

Takayasu, A., & Kunihiro, N. (2015). Partial key exposure attacks on CRT-RSA: Better cryptanalysis to full size encryption exponents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9092, pp. 518–537). Springer Verlag. https://doi.org/10.1007/978-3-319-28166-7_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free