A new attack on RSA with a composed decryption exponent.
Abderrahmane NitajMohamed Ould DouhPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- secret key
- public key
- ciphertext
- encryption algorithm
- private key
- signature scheme
- secure communication
- encryption scheme
- key exchange
- security analysis
- smart card
- modular exponentiation
- encryption decryption
- digital signature
- security model
- block cipher
- power law
- countermeasures
- neural network
- key distribution
- standard model
- authentication scheme
- malicious attacks
- key exchange protocol
- elliptic curve cryptography
- public key cryptosystems
- real time
- power analysis
- denial of service attacks
- pseudorandom
- dos attacks
- key management
- information security