Deterministic polynomial time equivalence between factoring and key-recovery attack on Takagi's RSA

10Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decryption algorithm is faster than the standard RSA, where N = prq while ed = 1 mod (p- 1)(q -1). In this paper, we show that a deterministic polynomial time equivalence also holds in this variant. The coefficient matrix T to which LLL algorithm is applied is no longer lower triangular, and hence we develop a new technique to overcome this problem. © International Association for Cryptologic Research 2007.

Author supplied keywords

Cite

CITATION STYLE

APA

Kunihiro, N., & Kurosawa, K. (2007). Deterministic polynomial time equivalence between factoring and key-recovery attack on Takagi’s RSA. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4450 LNCS, pp. 412–425). Springer Verlag. https://doi.org/10.1007/978-3-540-71677-8_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free