Partial Key Exposure on RSA with Private Exponents Larger Than N

@inproceedings{Joye2012PartialKE,
  title={Partial Key Exposure on RSA with Private Exponents Larger Than N},
  author={M. Joye and T. Lepoint},
  booktitle={ISPEC},
  year={2012}
}
  • M. Joye, T. Lepoint
  • Published in ISPEC 2012
  • Mathematics, Computer Science
  • In 1998, Boneh, Durfee and Frankel described several attacks against RSA enabling an attacker given a fraction of the bits of the private exponent d to recover all of d. These attacks were later improved and extended in various ways. [...] Key Result Our results are based on Coppersmith's heuristic methods and validated by practical experiments run through the SAGE computer-algebra system.Expand Abstract
    19 Citations
    New results for partial key exposure on RSA with exponent blinding
    • 1
    • Highly Influenced
    • PDF
    New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
    • 13
    • PDF
    Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
    • 10
    • Highly Influenced
    Cryptanalysis of RSA: A Special Case of Boneh-Durfee's Attack
    • PDF
    A New Partial Key Exposure Attack on Multi-power RSA
    • 4
    • PDF
    Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
    • 4
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 62 REFERENCES
    New Partial Key Exposure Attacks on RSA
    • 115
    • PDF
    Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
    • 22
    • PDF
    A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073
    • 69
    • PDF
    Partial Key Exposure: Generalized Framework to Attack RSA
    • 13
    New Attacks on RSA with Small Secret CRT-Exponents
    • 67
    • PDF
    An Attack on RSA Given a Small Fraction of the Private Key Bits
    • 186
    • PDF
    Cryptanalysis of short RSA secret exponents
    • 612
    • Highly Influential
    • PDF
    Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
    • 687
    • Highly Influential
    • PDF
    Advances in Cryptology - CRYPTO 2003
    • D. Boneh
    • Computer Science
    • Lecture Notes in Computer Science
    • 2003
    • 752
    Reconstructing RSA Private Keys from Random Key Bits
    • 130
    • PDF