Zheng, Mengce; Kunihiro, Noboru; Yao, Yuanzhi Cryptanalysis of the RSA variant based on cubic Pell equation. (English) Zbl 1517.94173 Theor. Comput. Sci. 889, 135-144 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Zheng} et al., Theor. Comput. Sci. 889, 135--144 (2021; Zbl 1517.94173) Full Text: DOI
Zheng, Mengce; Kunihiro, Noboru; Hu, Honggang Improved factoring attacks on multi-prime RSA with small prime difference. (English) Zbl 1416.94061 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10342, 324-342 (2017). MSC: 94A60 11Y05 PDFBibTeX XMLCite \textit{M. Zheng} et al., Lect. Notes Comput. Sci. 10342, 324--342 (2017; Zbl 1416.94061) Full Text: DOI
Takayasu, Atsushi; Kunihiro, Noboru Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits. (English) Zbl 1397.94101 Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 35-47 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Takayasu} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 9866, 35--47 (2016; Zbl 1397.94101) Full Text: DOI
Takayasu, Atsushi; Kunihiro, Noboru How to generalize RSA cryptanalyses. (English) Zbl 1353.94074 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 67-97 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Takayasu} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 9615, 67--97 (2016; Zbl 1353.94074) Full Text: DOI
Takayasu, Atsushi; Kunihiro, Noboru Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents. (English) Zbl 1423.94108 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 518-537 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Takayasu} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 9092, 518--537 (2015; Zbl 1423.94108) Full Text: DOI
Kunihiro, Noboru An improved attack for recovering noisy RSA secret keys and its countermeasure. (English) Zbl 1388.94066 Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 61-81 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 9451, 61--81 (2015; Zbl 1388.94066) Full Text: DOI
Takayasu, Atsushi; Kunihiro, Noboru General bounds for small inverse problems and its applications to multi-prime RSA. (English) Zbl 1457.94185 Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8949, 3-17 (2015). MSC: 94A60 11H71 PDFBibTeX XMLCite \textit{A. Takayasu} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 8949, 3--17 (2015; Zbl 1457.94185) Full Text: DOI
Takayasu, Atsushi; Kunihiro, Noboru Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound. (English) Zbl 1382.94163 Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 345-362 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Takayasu} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 8781, 345--362 (2014; Zbl 1382.94163) Full Text: DOI
Takayasu, Atsushi; Kunihiro, Noboru Cryptanalysis of RSA with multiple small secret exponents. (English) Zbl 1337.94074 Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 176-191 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Takayasu} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 8544, 176--191 (2014; Zbl 1337.94074) Full Text: DOI
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. (English) Zbl 1342.94078 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 352-367 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Koyama} et al., Lect. Notes Comput. Sci. 7839, 352--367 (2013; Zbl 1342.94078) Full Text: DOI
Kunihiro, Noboru; Shinohara, Naoyuki; Izu, Tetsuya A unified framework for small secret exponent attack on RSA. (English) Zbl 1292.94097 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 260-277 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Kunihiro} et al., Lect. Notes Comput. Sci. 7118, 260--277 (2012; Zbl 1292.94097) Full Text: DOI