Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach.
Santosh Kumar RavvaR. M. Krishna SureddiPublished in: Int. J. Inf. Comput. Secur. (2023)
Keyphrases
- secret key
- public key
- signature scheme
- private key
- secure communication
- encryption scheme
- ciphertext
- public key cryptography
- authentication scheme
- encryption decryption
- security analysis
- modular exponentiation
- digital signature
- key management
- pseudorandom
- security model
- smart card
- key exchange
- standard model
- diffie hellman
- elliptic curve cryptography
- digital signature scheme
- key distribution
- hash functions
- public key cryptosystems
- neural network
- security protocols
- power law
- wireless sensor networks
- evolutionary algorithm
- provably secure
- case study
- data mining
- cryptographic algorithms
- real time
- database