Abstract
Prime Power RSA is a variant of the RSA scheme due to Takagi with modulus for , where are of the same bit-size. In this paper, we concentrate on one type of Prime Power RSA which assumes . Two new attacks on this type of Prime Power RSA are presented when given two pairs of public and private exponents, namely, and with the same modulus N. Suppose that . In 2015, Zheng and Hu showed that when , N may be factored in probabilistic polynomial time. The first attack of this paper shows that one can obtain the factorization of N in probabilistic polynomial time, provided that . Later, in the second attack, we improve both the first attack and the attack of Zheng and Hu, and show that the condition already suffices to break the Prime Power RSA. By introducing multiple parameters, our lattice constructions take full advantage of known information, and obtain the best known attack. Specifically, we make full use of the information that is a divisor of N, while the attack of Zheng and Hu only assumes that is a divisor of N. As a consequence, this method implies a better lattice construction, and thus improves the previous attack. The experiments which reach a better upper bound than before also verify it. Our approaches are based on Coppersmith’s method for finding small roots of bivariate modular polynomial equations.
MSC:
94A60
1. Introduction
In 1977, Rivest, Shamir and Adleman [1] proposed the well-known RSA public key cryptosystem. From then on, RSA has played a very important role in cryptography, and has resulted in a wide variety of applications [2,3,4,5,6]. As a consequence, much effort has been made to evaluate the security of RSA. In this paper, we recall the lattice-based cryptanalysis of RSA and its variants, where Coppersmith’s method plays a pivotal part. Coppersmith’s method is to find small roots of v-variate modular polynomial equations or -variate integer polynomial equations in polynomial time based on lattice basis reduction. Initially, in 1996, Coppersmith [7,8] obtained the results for the case of . Later, the methods of Refs. [7,8] were reformulated by Howgrave-Graham [9] and Coron [10], respectively, in simpler ways, which have been widely adopted by researchers for cryptanalysis. The two reformulations by Howgrave-Graham and Coron can also be extended to the case of , in which the results are based on an assumption and thus are heuristic. In general, the reformulations are used when we refer to Coppersmith’s method.
As a powerful tool in the field of cryptanalysis, Coppersmith’s method has been used extensively to study the security of RSA and its variants. Let be the RSA modulus, where the primes are of the same bit-size. Denote the public exponent by e and the private exponent by d; thus, we have , where is Euler’s totient function. In Eurocrypt 1999, based on Coppersmith’s method, Boneh and Durfee [11] showed that N may be factored in polynomial time when , which improved Wiener’s result in Ref. [12]. As far as the authors know, the result is the best small private exponent attack up to now. Although several papers [13,14,15,16,17] revisited the work, none of them improved Boneh and Durfee’s bound. Generalizations of the small private exponent attack on RSA have also been considered when there are multiple public/private key pairs for the same RSA modulus N. See Refs. [18,19,20,21,22] for details of these generalizations.
In order to have a faster decryption process and keep security at the same time, Takagi [23] proposed a new cryptosystem based on RSA in Crypto 1998. This variant of RSA, usually called Prime Power RSA, assumed that modulus for , where are also of the same bit-size. There are two types of Prime Power RSA according to the definition of . In the first type, , while in the second type, . In CT-RSA 2008, Itoh, Kunihiro and Kurosawa [24] proved that polynomial time factorization of N is possible for the second type if . For the first type, Takaga [23] initially showed that Wiener’s continued fraction attack is effective for the small private exponent . Later, in PKC 2004, May [25] presented new attacks based on Coppersmith’s method when or . Both two bounds of May are improved up to by Lu et al. [26] in Asiacrypt 2015. Furthermore, Sarkar [27,28] improved the bounds of May and Lu et al. for some small r.
This paper concentrates on the first type of Prime Power RSA, namely, . Just like cryptanalysis of RSA with multiple small private exponents [18,19,20,21,22], we study small private exponent attacks on the first type of Prime Power RSA when given two pairs of public and private exponents, namely, and with the same modulus N. Suppose . In 2015, Zheng and Hu [29] showed that when , N may be factored in probabilistic polynomial time. In this paper, we present two new small private exponent attacks. The first attack shows that one can obtain the factorization of N in probabilistic polynomial time, provided that , which is better than Ref. [29] when . Later in the second attack, we improve both the result and the result up to for any . Just like Ref. [29], our attacks are based on Coppersmith’s method for finding small roots of bivariate modular polynomial equations. Thus, our results also rely on Assumption 1, which is introduced in Section 2 and examined through experiments in Section 5. We present our results as follows:
Theorem 1.
Let () be a known modulus of Prime Power RSA, where primes are of the same bit-size. Select such that , and . Then, under Assumption 1, N can be factored in probabilistic polynomial time if
Theorem 2.
Notations are defined as Theorem 1. Then, under Assumption 1, N can be factored in probabilistic polynomial time if
Theorems 1 and 2 can also be extended to partial key exposure attacks just like Ref. [29]. Suppose that for , we have , where MSBs (Most Significant Bits) is known and , or we have , where LSBs (Least Significant Bits) is known and . Then, partial key exposure attack corresponding to Theorem 1 implies that N can be factored in probabilistic polynomial time if . And similarly, one can obtain from Theorem 2. Proof of these two partial key exposure attacks is just the same as proof of Theorem 1 and Theorem 2 according to the analysis in Ref. [29].
Finally, we summarize related works and our contributions, which are given in Table 1. There are three attacks with one small private exponent, including May’s two results in Ref. [25] and Lu et al.’s result in Ref. [26]. For attacks with two small private exponents, Table 1 illustrates that Zheng and Hu’s result, namely, Ref. [29] Theorem 1, is a generalization of Ref. [25] Theorem 6. Similarly, our contributions, namely, Theorems 1 and 2, are obtained as generalizations of Ref. [25] Theorem 3 and Ref. [26] Theorem 4.
Table 1.
Related works and our contributions of attacks on Prime Power RSA with modulus .
We note that Coppersmith’s method is also powerful for cryptanalysis of other RSA variants, such as the CRT-RSA. One can refer to Refs. [30,31,32] for details, which present small private exponent attack, partial key exposure attack and other cryptanalysis for the RSA variant using CRT (Chinese Remainder Theorem) exponents.
The rest of this paper is organized as follows: In Section 2, we introduce the lattice-based Coppersmith’s method, mainly including Howgrave-Graham’s lemma and the LLL algorithm. Section 3 presents our first attack modulo p, and thus completes the proof of Theorem 1. Similarly, our second attack modulo is given and Theorem 2 is proved in Section 4. In Section 5, we examine the justification of our approaches through some experiments. Section 6 presents the conclusions.
2. Preliminaries
In this section, we introduce Coppersmith’s method for finding small roots of bivariate modular polynomial equations, which will be used in our attacks in Section 3 and Section 4. First of all, let us recall the definition of a lattice.
Definition 1.
Let be linearly independent row vectors for . A lattice Λ generated by is the set of all integral linear combinations of these vectors:
We call s the dimension of and its rank. Row vectors are a basis of , and we denote the basis as a matrix, called the basis matrix of :
The determinant of is defined as , which is independent of the choice of basis and only determined by . This paper only considers lattices for the case of . Thus, is a square matrix and .
For example, let and , then the lattice generated by is defined as . It is easy to find a short vector in a lattice for small dimension s. However, it becomes difficult as s grows. A lot of cryptanalysis works rely on finding short vectors in a high-dimension lattice. Thus, we must introduce the famous LLL algorithm as follows:
In 1982, Lenstra et al. [33] proposed the LLL algorithm for lattice basis reduction. It allows one to find short vectors in a lattice in polynomial time. The proof of the following fact can be found in Ref. [34]. The norm of a vector is defined as , for some positive integer i.
Proposition 1
(LLL). Let s be the dimension (and the rank) of Λ. Given a basis (square) matrix of Λ, the LLL algorithm outputs an LLL-reduced basis satisfying
in polynomial time in s and in the bit sizes of the entries of the basis matrix .
Next, we introduce the following useful lemma due to Howgrave-Graham [9]. The norm of a polynomial is defined as .
Lemma 1
(Howgrave-Graham). Let be a polynomial that consists of at most s monomials. Suppose that there exists satisfying
and we have
Then, holds over the integers.
Combining Proposition 1 with Lemma 1, one can analyse the bounds for the small roots. The method is called Coppersmith’s method, which has been widely adopted by researchers for lattice-based cryptanalysis of RSA. Now, we summarize Coppersmith’s method for the case of bivariate modular polynomial equations as follows:
Finding small roots of bivariate modular polynomial equations can be described as finding each root of
Let m be a positive integer, and find a subset of satisfying
Given an order of some monomials of , there is a one-to-one correspondence between a polynomial in and a vector in a subset of , and components of the vector are coefficients of in order of the corresponding monomials. For example, if and the monomial order is defined such that , we know that the polynomial corresponds to the vector . is also required to be a lattice of dimension s. Combining Proposition 1 for with Lemma 1 for and , if
is satisfied, by running the LLL algorithm, one can obtain two polynomials , both of which share the desired root as a common root over the integers. Then, Coppersmith’s method needs the following assumption:
Assumption 1.
Polynomials obtained by our lattice-based method are algebraically independent, and the common roots of these polynomials can be efficiently computed using techniques like calculation of the resultants or finding a Gröbner basis.
Since Assumption 1 is heuristic, we need to perform experiments to examine it in our attacks, which is done in Section 5. In our experiments, we choose to extract the desired root by computing the resultants of and . See Section 5 for these details.
Notice that Inequality (1) is equivalent to In fact, researchers often ignore terms that do not depend on W. Thus, we obtain
According to the analysis above, under Assumption 1, using Coppersmith’s method to find small roots of bivariate modular polynomial equations just requires the condition Inequality (2).
3. First Attack: Solving Simultaneous Equations Modulo
This section will present our first attack, and thus complete the proof of Theorem 1. Recall the notations defined in Theorem 1 at first. Let () be a known modulus of Prime Power RSA, where primes are of the same bit-size. Select such that , and . Here, are chosen as , for some very small nearly equal to 0.
For , since , there exists integer such that
In this section, we consider simultaneous equations modulo p. Since , it is obvious that p divides . Thus, Equation (3) implies
Let be the inverse of modulo N, and then we have
If does not exist, we can obtain the factorization of N by computing the greatest common divisors of and N. From Equation (4), we know that is a solution of
which is also equivalent to
For a positive integer m, we define the following shift polynomials:
where . Let , and then one can check that all polynomials share the common root modulo . To construct the basis matrix of our lattice , we select the shift polynomials , where belongs to
It implies that the shift polynomials are chosen for
Define the monomial order ≺ as if or . Then, the coefficient vectors of are determined according to ≺, and thus we acquire the basis matrix that consists of these coefficient vectors.
Just as (Ref. [29], Table 1), Table 2 in this paper illustrates an example of with parameters . Here, we use the polynomial in Table 2 to show the one-to-one correspondence between a polynomial and a row vector of the basis matrix . We have , and . Thus, one can obtain . Considering the corresponding coefficients to the monomials , from , we obtain a row vector or simply for the basis matrix . Here, the notation * denotes a non-zero value for the off-diagonal entries of , and these non-zero values are not important.
Table 2.
Basis matrix with when .
As Table 2 shows, the basis matrix is a lower triangular square matrix. Among the off-diagonal entries of , some are zero and we denote other non-zero entries as * in Table 2. Since the diagonal entries of are clear, one can simply calculate its determinant as .
Generally speaking, let , and define the sets
Then, we have
Let s denote the dimension of , and we can calculate
According to the definitions of the shift polynomials , we know all of them share the common root modulo , where . Thus, all integral linear combinations of these also share the common root modulo . Furthermore, we construct a lattice , each vector of which can be exactly written as the coefficient vector of a polynomial, which is an integral linear combination of . Then, just as described in Section 2 (Preliminaries), under Assumption 1, using Coppersmith’s method to find the small common root just requires the condition Inequality (2), namely, , where . (We note that after the private exponents are obtained, either of them can yield the factorization of N in probabilistic polynomial time [35], Chapter 4.6.1).
From condition and calculation of and s, we have
Since primes are of the same bit-size, we have . Together with , it is obtained that
Take and omit term ; then, we have
which finally reduces to
The running time of our first attack is analogous to the attack in Ref. [29]. Thus, Theorem 1 follows.
4. Second Attack: Solving Simultaneous Equations Modulo
In this section, we present the second attack, and thus complete the proof of Theorem 2. Similarly, recall the notations at first. Let () be a known modulus of Prime Power RSA, where the primes are of the same bit-size. Select such that , and . Here, are also chosen as , for some very small nearly equal to 0.
This section pays attention to simultaneous equations modulo . Note that for , Equation (3) also implies
which is equivalent to
where is the inverse of modulo N. Thus, is also a solution of
Note that our first attack in Section 3 begins with , though also holds. Thus, our first attack does not take full advantage of known information when , and is only better than the attack in Ref. [29] when . Since p is unknown, one must use the known integer N as a constant factor to construct the shift polynomials which share the common root modulo for some integer t. When , Section 3 makes full use of the information that is a divisor of N, while the attack in Ref. [29] only assumes that is a divisor of N and thus is improved by our first attack. In this section, we begin with , while the information that is a divisor of N is also made full use of at the same time. Namely, the shift polynomials for our second attack are defined as follows:
where , and m is a positive integer. Let , and one can see that divides . Thus, all polynomials share the common root modulo . To construct the basis matrix of our second lattice , shift polynomials are chosen for
Define the same monomial order ≺ as Section 3, and we acquire the basis matrix that consists of coefficient vectors of . Similar to (Ref. [29], Table 2), Table 3 in this paper shows an example of with when . We note that in Table 3 while in (Ref. [29], Table 2), though both of them are equal to 0 modulo . As Table 3 shows, the basis matrix is a lower triangular square matrix. Among the off-diagonal entries of , some are zero and we denote other non-zero entries as * in Table 3. Since the diagonal entries of are clear, one can simply calculate its determinant as .
Table 3.
Basis matrix with when .
Generally speaking, let , and define the sets
Then, we have
Denote the dimension of , and calculate
Similar to Section 3, our second attack also requires the condition Inequality (2), namely, , where . From condition and calculation of and , we have
Substituting , it is obtained that
The running time of our second attack is also analogous to the attack in Ref. [29]. Thus, Theorem 2 follows.
5. Experiments
Just like other cryptanalyses of RSA based on Coppersmith’s method, our approaches are heuristic due to Assumption 1 as stated before. In order to show the correctness of our results, we implemented several experiments in SAGE 5.0 over Linux Fedora 16 on a laptop with 2.80 GHz Intel Core2 CPU and 4 GB RAM.
We choose to use calculation of the resultants to examine Assumption 1 in our experiments. Suppose after running the LLL algorithm, we finally acquire two polynomials with desired as a common root over the integers. By computing the resultants of and , we can eliminate ; namely, we obtain . If Assumption 1 holds, . Thus, one can use any standard root-finding algorithm to recover the desired root from . Similarly is also computed from or .
In all of our experiments, Assumption 1 always holds and we have successfully collected the desired root . We present some experimental results for our first attack (Theorem 1) in Table 4, while Table 5 is shown for our second attack (Theorem 2).
Table 4.
Some experimental results for our first attack (Theorem 1).
Table 5.
Some experimental results for our second attack (Theorem 2).
Let us take several examples to illustrate our experiments in detail. In Table 4, firstly, we select and a 1000-bit Prime Power RSA modulus N. It means , and is a nearly 283-bit private exponent (or slightly smaller than a 283-bit number), and is a nearly 151-bit private exponent (or slightly smaller than a 151-bit number). One can check that holds for . Thus, according to Theorem 1, the modulus N can be easily factored. Just as our first attack in Section 3 shows, we construct a lattice with parameter . One can calculate the dimension , and . Both and will determine the time for the LLL algorithm to obtain the desired root . It takes us about 748.8 s for this first example. For other examples, as or becomes smaller, it takes less time to run the LLL algorithm.
For the last example in Table 5, we select and a 2000-bit Prime Power RSA modulus N. It means , and is a nearly 950-bit private exponent, and is a nearly 948-bit private exponent. One can check that holds for . Thus, according to Theorem 2, the modulus N can be easily factored. Just as our second attack in Section 4 shows, we construct a lattice with parameter . One can calculate the dimension , and . For this case of and , it takes us about 352.5 s to run the LLL algorithm to obtain the desired root . There are also other examples shown in Table 5 for our second attack (Theorem 2).
6. Conclusions
In this paper, we show a new cryptanalysis of Prime Power RSA, where and . As generalizations of small private exponent attacks, two new attacks with two small private exponents are presented. Our first attack shows that when , N may be factored in probabilistic polynomial time. This is better than in Ref. [29] when . Later, our second attack improves both the result and the result up to for any . The key point is that we try our best to make full use of known information. Our attacks are based on Coppersmith’s method for finding small roots of bivariate modular polynomial equations, and the justifications for our approaches are examined through experiments.
Just like other lattice-based cryptanalyses of RSA and its variants using Coppersmith’s method, a better lattice construction will lead to a better result. The open problem is how to further improve the using a new novel lattice construction? Moreover, besides Coppersmith’s method, is there another innovative lattice-based method which can be a powerful tool for the cryptanalysis of RSA? These will be interesting topics for future work.
Author Contributions
Methodology, S.W. and M.S.; Software, M.S.; Validation, S.W.; Writing—original draft, S.W.; Writing—review and editing, M.S. All authors have read and agreed to the published version of the manuscript.
Funding
This research is funded by the National Natural Science Foundation of China (Grant No. 62102440).
Data Availability Statement
The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Yang, Q.; Zhang, M.; Zhou, Y.; Yu, Y. Attribute-based worker selection scheme by using blockchain in decentralized crowdsourcing scenario. Chin. J. Electron. 2021, 30, 249–257. [Google Scholar]
- Jia, H.; Chen, Y.; Yang, K.; Guo, K.; Wang, Z. Revocable broadcast encryption with constant ciphertext and private key size. Chin. J. Electron. 2019, 28, 690–697. [Google Scholar] [CrossRef]
- Ding, Y.; Hu, J.; Wang, D.; Tan, H. A high-performance RSA coprocessor based on half-carry-save and dual-core MAC architecture. Chin. J. Electron. 2018, 27, 70–75. [Google Scholar] [CrossRef]
- Liu, J.; Yang, J.; Cheng, Z.; Wang, M. Anti-eavesdropping network coding algorithm based on T-N threshold. Chin. J. Electron. 2017, 26, 372–376. [Google Scholar] [CrossRef]
- Zhu, Y.; Wang, S.; Ma, D.; Feng, R. Identity-based encryption on RSA without pairings and key escrow. Chin. J. Electron. 2014, 23, 842–850. [Google Scholar]
- Coppersmith, D. Finding a small root of a univariate modular equation. In Advances in Cryptology-EUROCRYPT 1996; Springer: Berlin/Heidelberg, Germany, 1996; pp. 155–165. [Google Scholar]
- Coppersmith, D. Finding a small root of a bivariate integer equation; factoring with high bits known. In Advances in Cryptology-EUROCRYPT 1996; Springer: Berlin/Heidelberg, Germany, 1996; pp. 178–189. [Google Scholar]
- Howgrave-Graham, N. Finding small roots of univariate modular equations revisited. In Crytography and Coding; Springer: Berlin/Heidelberg, Germany, 1997; pp. 131–142. [Google Scholar]
- Coron, J.S. Finding small roots of bivariate integer polynomial equations revisited. In Advances in Cryptology-EUROCRYPT 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 492–505. [Google Scholar]
- Boneh, D.; Durfee, G. Cryptanalysis of RSA with private key d less than N0.292. In Advances in Cryptology-EUROCRYPT 1999; Springer: Berlin/Heidelberg, Germany, 1999; pp. 1–11. [Google Scholar]
- Wiener, M.J. Cryptanalysis of short RSA secret exponents. IEEE Trans. Inf. Theory 1990, 36, 553–558. [Google Scholar] [CrossRef]
- Blömer, J.; May, A. Low secret exponent RSA revisited. In Cryptography and Lattices; Springer: Berlin/Heidelberg, Germany, 2001; pp. 4–19. [Google Scholar]
- Herrmann, M.; May, A. Maximizing small root bounds by linearization and applications to small secret exponent RSA. In Public Key Cryptography-PKC 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 53–69. [Google Scholar]
- Kunihiro, N. Solving generalized small inverse problems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2011, 94, 1274–1284. [Google Scholar] [CrossRef]
- Kunihiro, N. On optimal bounds of small inverse problems and approximate GCD problems with higher degree. In Information Security; Springer: Berlin/Heidelberg, Germany, 2012; pp. 55–69. [Google Scholar]
- Kunihiro, N.; Shinohara, N.; Izu, T. A unified framework for small secret exponent attack on RSA. In Selected Areas in Cryptography; Springer: Berlin/Heidelberg, Germany, 2011; pp. 260–277. [Google Scholar]
- Howgrave-Graham, N.; Seifert, J.P. Extending Wiener’s attack in the presence of many decrypting exponents. In Secure Networking-CQRE [Secure] 1999; Springer: Berlin/Heidelberg, Germany, 1999; pp. 153–166. [Google Scholar]
- Sarkar, S.; Maitra, S. Cryptanalysis of RSA with two decryption exponents. Inf. Process. Lett. 2010, 110, 178–181. [Google Scholar] [CrossRef]
- Sarkar, S.; Maitra, S. Cryptanalysis of RSA with more than one decryption exponent. Inf. Process. Lett. 2010, 110, 336–340. [Google Scholar] [CrossRef]
- Aono, Y. Minkowski sum based lattice construction for multivariate simultaneous Coppersmiths technique and applications to RSA. In Information Security and Privacy; Springer: Berlin/Heidelberg, Germany, 2013; pp. 88–103. [Google Scholar]
- Takayasu, A.; Kunihiro, N. Cryptanalysis of RSA with Multiple Small Secret Exponents. In Proceedings of the ACISP 2014, Wollongong, NSW, Australia, 7–9 July 2014; pp. 176–191. [Google Scholar]
- Takagi, T. Fast RSA-type cryptosystem modulo pkq. In Advances in Cryptology-CRYPTO’98; Springer: Berlin/Heidelberg, Germany, 1998; pp. 318–326. [Google Scholar]
- Itoh, K.; Kunihiro, N.; Kurosawa, K. Small secret key attack on a variant of RSA (due to Takagi). In Topics in Cryptology-CT-RSA 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 387–406. [Google Scholar]
- May, A. Secret Exponent Attacks on RSA-type Schemes with Moduli N = prq. In Public Key Cryptography-PKC 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 218–230. [Google Scholar]
- Lu, Y.; Zhang, R.; Peng, L.; Lin, D. Solving linear equations modulo unknown divisors: Revisited. In Advances in Cryptology-ASIACRYPT 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 189–213. [Google Scholar]
- Sarkar, S. Small secret exponent attack on RSA variant with modulus N = prq. Designs Codes Cryptogr. 2014, 73, 383–392. [Google Scholar] [CrossRef]
- Sarkar, S. Revisiting prime power RSA. Discret. Appl. Math. 2015, 203, 127–133. [Google Scholar] [CrossRef]
- Zheng, M.C.; Hu, H.G. Cryptanalysis of Prime Power RSA with two private exponents. Sci. China Inf. Sci. 2015, 58, 1–8. [Google Scholar] [CrossRef][Green Version]
- Takayasu, A.; Lu, Y.; Peng, L. Small CRT-exponent RSA revisited. J. Cryptol. 2019, 32, 1337–1382. [Google Scholar] [CrossRef]
- May, A.; Nowakowski, J.; Sarkar, S. Partial key exposure attack on short secret exponent CRT-RSA. In Advances in Cryptology CASIACRYPT 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 99–129. [Google Scholar]
- Zheng, M. Revisiting the polynomial-time equivalence of computing the CRT-RSA secret key and factoring. Mathematics 2022, 10, 2238. [Google Scholar] [CrossRef]
- Lenstra, A.K.; Lenstra, H.W.; Lovász, L. Factoring polynomials with rational coefficients. Math. Ann. 1982, 261, 515–534. [Google Scholar] [CrossRef]
- May, A. New RSA Vulnerabilities Using Lattice Reduction Methods. Ph.D. Thesis, University of Paderborn, Paderborn, Germany, 2003. [Google Scholar]
- Stinson, D.R. Cryptography: Theory and Practice, 2nd ed.; CRC Press: Boca Raton, FL, USA, 2002. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).