There have been several papers which studied the security of CRT-RSA when some bits of CRT-exponents dp and dq are known to attackers. At first, Blömer and May (Crypto 2003) proposed attacks which used the most or the least significant bits of either dp or dq. Next, Sarkar and Maitra (ACNS 2009) generalized the scenario and proposed an attack which used the most significant bits of both dp and dq. Recently, Lu et al. (ACNS 2014) proposed improved attacks for the same scenario as Blömer and May. These works showed that public RSA modulus can be factored when e
CITATION STYLE
Takayasu, A., & Kunihiro, N. (2015). Partial key exposure attacks on CRT-RSA: Better cryptanalysis to full size encryption exponents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9092, pp. 518–537). Springer Verlag. https://doi.org/10.1007/978-3-319-28166-7_25
Mendeley helps you to discover research relevant for your work.