skip to main content
poster

A variant of Wiener's attack on RSA with small secret exponent

Published:25 July 2008Publication History

Abstract

No abstract available.

References

  1. D. Boneh, G. Durfee, Cryptanalysis of RSA with private key d less than N0:292, Advances in Cryptology - Proceedings of Eurocrypt '99, Lecture Notes in Comput. Sci. 1952 (1999), 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Dujella, Continued fractions and RSA with small secret exponent, Tatra Mt. Math. Publ. 29 (2004), 101--112.Google ScholarGoogle Scholar
  3. A. Dujella, B. Ibrahimpašič, On Worley's theorem in Diophantine approximations, preprint.Google ScholarGoogle Scholar
  4. J. Hinek, On the Security of Some Variants of RSA, Ph.D. Thesis, University of Waterloo, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Steinfeld, S. Contini, H. Wang, J. Pieprzyk, Converse results to the Wiener attack on RSA, Public Key Cryptography - PKC 2005, Lecture Notes in Comput. Sci. 3386 (2005), 184--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H.-M. Sun, M.-E. Wu, Y.-H. Chen, Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack, Applied Cryptography and Network Security, Lecture Notes in Comput. Sci. 4521 (2007), 116--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. R. Verheul, H. C. A. van Tilborg, Cryptanalysis of 'less short' RSA secret exponents, Appl. Algebra Engrg. Comm. Computing 8 (1997), 425--435.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. J. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory 36 (1990), 553--558.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. T. Worley, Estimating |α -- p/q|, Austral. Math. Soc. Ser. A 31 (1981), 202--206.Google ScholarGoogle Scholar

Index Terms

  1. A variant of Wiener's attack on RSA with small secret exponent

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Communications in Computer Algebra
                ACM Communications in Computer Algebra  Volume 42, Issue 1-2
                March/June 2008
                136 pages
                ISSN:1932-2240
                DOI:10.1145/1394042
                Issue’s Table of Contents

                Copyright © 2008 Author

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 25 July 2008

                Check for updates

                Qualifiers

                • poster

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader