Mathematical Attacks on RSA Cryptosystem. Mathematical Attacks on RSA Cryptosystem.

Mathematical Attacks on RSA Cryptosystem‪.‬

Journal of Computer Science 2006, August, 2, 8

    • $5.99
    • $5.99

Publisher Description

Abstract: In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage. Key words: RSA, cryptography, cryptanalysis, attack, factorization, low-exponent, one-way function

GENRE
Computing & Internet
RELEASED
2006
1 August
LANGUAGE
EN
English
LENGTH
25
Pages
PUBLISHER
Science Publications
SELLER
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
175.7
KB
Topics in Cryptology - CT-RSA 2009 Topics in Cryptology - CT-RSA 2009
2009
New Directions of Modern Cryptography New Directions of Modern Cryptography
2012
Homomorphic Encryption and Applications Homomorphic Encryption and Applications
2014
Information Security Information Security
2007
Modern Cryptography with Proof Techniques and Implementations Modern Cryptography with Proof Techniques and Implementations
2021
Information Security Applications Information Security Applications
2009
Wifi Technology: Future Market Challenges and Opportunities. Wifi Technology: Future Market Challenges and Opportunities.
2006
A Fast Approximate String Searching Algorithm. A Fast Approximate String Searching Algorithm.
2005
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
2010
A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf) A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf)
2007
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011