Hatem M. Bahig

Learn More
This paper presents three new attacks on the RSA cryp-tosystem. The first two attacks work when k RSA public keys (Ni, ei) are such that there exist k relations of the shape eix − yiφ(Ni) = zi or of the shape eixi − yφ(Ni) = zi where Ni = piqi, φ(Ni) = (pi − 1)(qi − 1) and the parameters x, xi, y, yi, zi are suitably small in terms of the prime factors of(More)