Author of the publication

Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.

, , and . CANS, volume 13641 of Lecture Notes in Computer Science, page 245-257. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Attack on Some Variants of the RSA Cryptosystem., , and . SAC, volume 11349 of Lecture Notes in Computer Science, page 421-433. Springer, (2018)Factoring RSA Moduli with Weak Prime Factors., and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 361-374. Springer, (2015)Dirichlet Product for Boolean Functions., , and . IACR Cryptology ePrint Archive, (2016)A New Generalization of the KMOV Cryptosystem., and . IACR Cryptology ePrint Archive, (2017)Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis., , , , and . IACR Cryptol. ePrint Arch., (2021)Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis., , , , and . IACR Cryptol. ePrint Arch., (2021)New Attacks on the RSA Cryptosystem., , , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 178-198. Springer, (2014)A new attack on RSA with a composed decryption exponent., and . IACR Cryptology ePrint Archive, (2014)Lattice Attacks on the DGHV Homomorphic Encryption Scheme., and . IACR Cryptology ePrint Archive, (2015)Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 455-466. Springer, (2018)