Multiplicative Inverse

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3165 Experts worldwide ranked by ideXlab platform

Hemen Dutta - One of the best experts on this subject based on the ideXlab platform.

B. V. Senthil Kumar - One of the best experts on this subject based on the ideXlab platform.

P. Anuradha Kameswari - One of the best experts on this subject based on the ideXlab platform.

  • an attack bound for small Multiplicative Inverse of φ n mod e with a composed prime sum p q using sublattice based techniques
    Cryptography, 2018
    Co-Authors: P. Anuradha Kameswari, Lambadi Jyotsna
    Abstract:

    In this paper, we gave an attack on RSA (Rivest–Shamir–Adleman) Cryptosystem when φ ( N ) has small Multiplicative Inverse modulo e and the prime sum p + q is of the form p + q = 2 n k 0 + k 1 , where n is a given positive integer and k 0 and k 1 are two suitably small unknown integers using sublattice reduction techniques and Coppersmith’s methods for finding small roots of modular polynomial equations. When we compare this method with an approach using lattice based techniques, this procedure slightly improves the bound and reduces the lattice dimension. Employing the previous tools, we provide a new attack bound for the deciphering exponent when the prime sum p + q = 2 n k 0 + k 1 and performed an analysis with Boneh and Durfee’s deciphering exponent bound for appropriately small k 0 and k 1 .

  • An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques
    Cryptography, 2018
    Co-Authors: P. Anuradha Kameswari, Lambadi Jyotsna
    Abstract:

    In this paper, we gave an attack on RSA (Rivest–Shamir–Adleman) Cryptosystem when φ ( N ) has small Multiplicative Inverse modulo e and the prime sum p + q is of the form p + q = 2 n k 0 + k 1 , where n is a given positive integer and k 0 and k 1 are two suitably small unknown integers using sublattice reduction techniques and Coppersmith’s methods for finding small roots of modular polynomial equations. When we compare this method with an approach using lattice based techniques, this procedure slightly improves the bound and reduces the lattice dimension. Employing the previous tools, we provide a new attack bound for the deciphering exponent when the prime sum p + q = 2 n k 0 + k 1 and performed an analysis with Boneh and Durfee’s deciphering exponent bound for appropriately small k 0 and k 1 .

  • Cryptanalysis of RSA with Small Multiplicative Inverse of (p - 1) or (q - 1) Modulo e
    2018
    Co-Authors: P. Anuradha Kameswari
    Abstract:

    In this paper, we mount an attack on RSA by using lattice based techniques implemented in the case when p - 1 or q - 1 have small Multiplicative Inverse less than or equal to N δ modulo the public encryption exponent e , for some small δ and described the attack bounds for δ.

Daniel Bergh - One of the best experts on this subject based on the ideXlab platform.

Lambadi Jyotsna - One of the best experts on this subject based on the ideXlab platform.

  • An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques
    Cryptography, 2018
    Co-Authors: P. Anuradha Kameswari, Lambadi Jyotsna
    Abstract:

    In this paper, we gave an attack on RSA (Rivest–Shamir–Adleman) Cryptosystem when φ ( N ) has small Multiplicative Inverse modulo e and the prime sum p + q is of the form p + q = 2 n k 0 + k 1 , where n is a given positive integer and k 0 and k 1 are two suitably small unknown integers using sublattice reduction techniques and Coppersmith’s methods for finding small roots of modular polynomial equations. When we compare this method with an approach using lattice based techniques, this procedure slightly improves the bound and reduces the lattice dimension. Employing the previous tools, we provide a new attack bound for the deciphering exponent when the prime sum p + q = 2 n k 0 + k 1 and performed an analysis with Boneh and Durfee’s deciphering exponent bound for appropriately small k 0 and k 1 .

  • an attack bound for small Multiplicative Inverse of φ n mod e with a composed prime sum p q using sublattice based techniques
    Cryptography, 2018
    Co-Authors: P. Anuradha Kameswari, Lambadi Jyotsna
    Abstract:

    In this paper, we gave an attack on RSA (Rivest–Shamir–Adleman) Cryptosystem when φ ( N ) has small Multiplicative Inverse modulo e and the prime sum p + q is of the form p + q = 2 n k 0 + k 1 , where n is a given positive integer and k 0 and k 1 are two suitably small unknown integers using sublattice reduction techniques and Coppersmith’s methods for finding small roots of modular polynomial equations. When we compare this method with an approach using lattice based techniques, this procedure slightly improves the bound and reduces the lattice dimension. Employing the previous tools, we provide a new attack bound for the deciphering exponent when the prime sum p + q = 2 n k 0 + k 1 and performed an analysis with Boneh and Durfee’s deciphering exponent bound for appropriately small k 0 and k 1 .