New partial key exposure attacks on RSA with additive exponent blinding

Z Jiang, Y Zhou, Y Liu - Cybersecurity, 2024 - Springer
Partial key exposure attacks present a significant threat to RSA-type cryptosystems. These
attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent …

Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA

Y Feng, A Nitaj, Y Pan - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Let $(N, e) $ be a public key of the RSA cryptosystem, and $ d $ be the
corresponding private key. In practice, we usually choose a small $ e $ for quick encryption …

Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis

M Zheng, H Kang - Cybersecurity, 2024 - Springer
The RSA (Rivest–Shamir–Adleman) cryptosystem is a widely used public-key cryptographic
algorithm in information systems and computer applications. With the advancement of lattice …

Exploring decryption failures of bike: New class of weak keys and key recovery attacks

T Wang, A Wang, X Wang - Annual International Cryptology Conference, 2023 - Springer
Code-based cryptography has received a lot of attention recently because it is considered
secure under quantum computing. Among them, the QC-MDPC based scheme is one of the …

Partial key exposure attacks on Prime Power RSA with non-consecutive blocks

Z Jiang, Y Zhou, Y Liu - Theoretical Computer Science, 2024 - Elsevier
Partial key exposure attacks pose a significant threat to RSA-type cryptosystems. These
attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent …

Partial Key Exposure Attack on Common Prime RSA

M Zheng - International Conference on Information Security and …, 2023 - Springer
In this paper, we focus on the common prime RSA variant and introduce a novel
investigation into the partial key exposure attack. We are able to identify weak private keys …

[PDF][PDF] Information extraction and exploitation for efficient side-channel security evaluations.

Y Zhou - 2023 - dial.uclouvain.be
SCA has been pioneered by Kocher in 1996 [Koc96] and is different from classical
cryptanalysis techniques. The principle of SCA is to analyse the side-channel signals …