1. Introduction
The RSA system was proposed in 1977 by Rivest, Shamir, and Adleman [
37] as a public key cryptosystem. The algorithm is based on a trap door function that utilizes Fermat-Euler theorem. The RSA algorithm strength depends on the difficulty of factorizing a large integer
n which is the product of two large primes
p and
q. In RSA, the public exponent is an integer
e and the private exponent is an integer
d such that
.
Since its publication, the RSA cryptosystem has been intensively studied for vulnerabilities using various methods (see [
4,
16]). On the other hand, to improve the efficiency of RSA, many variants have been proposed such as Batch RSA [
13], Multi-prime RSA [
8], Prime-power RSA [
41], CRT-RSA [
10], Rebalanced-RSA [
45], Dual RSA [
40] and DRSA [
34].
In 1985, Koblitz [
21] and Miller [
28] showed independently how to use elliptic curves over finite fields for the design of cryptosystems. Such schemes contribute to the elliptic curve cryptography (ECC) and their security is based on the hardness of the elliptic curve discrete logarithm (ECDLP). ECC offers high security with smaller keys and more efficient implementations than traditional public key cryptosystems such as RSA. ECC is increasingly used in industry for digital signatures such as ECDSA [
30], key agreement such as ECDH [
7] and Bitcoin [
29].
In 1991, Koyama et al. [
20] proposed a new scheme called KMOV, by adapting RSA to the elliptic curve with an equation
over the ring
, where
is an RSA modulus satisfying
. In KMOV,
b is computed during the encryption process in terms of the plaintext
as
. The main property in KMOV is that
for any point
P of the elliptic curve where
is the point at infinity. In 1993, Demytko [
11] proposed a variant of RSA where the elliptic curve with the equation
over
is fixed. The advantage of Demytko’s scheme over KMOV is that it uses only the
x-coordinate of the points of the elliptic curve. One of the common properties of both schemes is that their security is based on the hardness of factoring large composite integers.
In this paper, we propose a new RSA variant based on the elliptic curve with the equation over the ring where is an RSA modulus with , , and . The number of points of the elliptic curve over the finite field is with . Similarly, the number of points of the same elliptic curve over is with .
The new scheme is a variant of both RSA and KMOV and works as follows. The public exponent is an integer
e satisfying
where
with
, and
. To encrypt a message
m, one generates a random integer
r with
, computes
, and
on the elliptic curve with equation
over the ring
. The point
C is then the encrypted message. To decrypt
C, one first computes
and the two values
and
such that
and
Using
and
, one computes
, and
. Finally, one computes the initial message
on the elliptic curve with equation
over the ring
.
We study the security of the new scheme regarding the modulus n, the private multiplier d and the elliptic curve with an equation . For the modulus , we study its resistance against factorization algorithms, and its decomposition as the sum of two or four squares. We show that knowing the order with , and is not sufficient to factor n. For the private multiplier d, we show that the attacks based on the continued fraction algorithm or Coppersmith’s method are applicable only if . For comparison, the former techniques are applicable for RSA and KMOV when their private exponent and multiplier is such that . Finally, we study the discrete logarithm problem for an elliptic curve with the equation . We also study the isomorphism and the homomorphism attacks and the way to overcome them.
The rest of the paper is organized as follows. In
Section 2, we present three results that will be used in the paper. In
Section 3 and
Section 4, we present the theory of elliptic curves over a finite field
and a finite ring
respectively. In
Section 5, we present the new scheme. In
Section 6, we present a detailed analysis of the security of the new scheme. We conclude the paper in
Section 7.
2. Useful Lemmas
In this section, we present some results that will be convenient for the security analysis of our new scheme.
Let
be an RSA modulus with balanced prime factors
p and
q, typically,
. The following result gives upper and lower bounds for
p and
q in terms of
n [
31].
Lemma 1.
Let be the product of two unknown integers such that . Then
In 1990, Wiener [
45] showed that RSA with a public key
is insecure if the private exponents
d satisfies
with
. His method is based on the continued fraction algorithm and makes use of the following result (Theorem 184 of [
15]).
Theorem 1.
Let ξ be a real number. Let a and b be two positive integers satisfying and
Then is a convergent of the continued fraction expansion of ξ.
In 1996, Coppersmith [
9] described a polynomial-time algorithm for finding small solutions of univariate modular polynomial equations. The method is based on lattice reduction. Since then, Coppersmith method has been extended to solve modular polynomial equations with more variables, and has been used for cryptanalysis, especially in regards with the RSA system. To illustrate this point, Boneh and Durfee [
6] presented an attack on RSA by transforming the RSA key equation
into the small inverse problem
. Using Coppersmith’s method, they improved Wiener’s attack up to
.
The following result is a generalization of the method of Boneh and Durfee for solving the small inverse problem (see [
6,
42,
44]).
Lemma 2. Let n and e be two distinct integers of the same size. Let x and y be two integers such that , , and . If and , then one can find x and y in polynomial time.
3. Elliptic Curves over the Finite Field
In this section, we present the main definitions and properties of elliptic curves. For more properties, see [
17,
38,
39,
43].
Let
p be a prime number and
be the finite field with
p elements. An elliptic curve
E over
is an algebraic curve with no singular points, given by the Weierstrass equation
where
for
. When
, the equation can be transformed into the short Weierstrass equation
with nonzero discriminant
. The set of points
satisfying the equation, along with the infinity point
is denoted
. The total number of points on
is called the order of
E and is denoted
. It is well known that
can be written as
where
t is bounded by the following result of Hasse
. An addition law is defined over
using the chord-tangent method.
The following result is fundamental to find the exact value of
for specific elliptic curves (see Theorem 5, page 307,
Section 4, Chapter 18 of [
18]).
Theorem 2.
Let be a prime number with . Let with . Consider the elliptic curve with equation over . Then
where , , and is the biquadratic (or quartic) residue character of α modulo π.
The following result gives an explicit solution for
(See page 122, Proposition 9.8.2 of [
18]).
Theorem 3.
Let be a prime number with . Let with . Then
where , .
The following result is valid when the residue quartic character is computed modulo p.
Lemma 3.
Let be a prime number with . Let with . Then
Proof. Let
be a prime number. First, we have
and
. Next, let
with
. By Fermat’s Little Theorem, we have
. Then
or
. If
, then
, and if
, then
and
. Summarizing, we have
modulo
p. This terminates the proof. □
In the following result, we give a simple proof for the estimation of
when
. Alternative proofs can be found in [
43] (Section 4.4 p. 115) and [
18] (
Section 4 in Chapter 18).
Lemma 4.
Let be a prime number with and . For with , let be the elliptic curve with the equation over . Then
Proof. Let
with
and
. We set
with
. Then
and
Also, we have
We apply Theorem 2 to the elliptic curve with equation
over
. We get
Theorem 3 asserts that
. First, assume that
. Then
and
Next, assume that
. Then
and
Now, assume that
. Since
, then
and
. Hence
and
Finally, assume that
. Then
and
which gives
This terminates the proof. □
4. Elliptic Curves over the Ring
In this section, we briefly describe the theory of elliptic curves over the ring
where
is an RSA modulus (see [
43], Section 2.11 and [
25] for more details).
Let
with
. The elliptic curve
is the set of points
satisfying the equation
together with the point at infinity, denoted
. By the Chinese remainder Theorem, the set
is isomorphic to the direct sum
where
is the elliptic curve with equation
over
with the point at infinity
, and
is the elliptic curve with equation
over
with the point at infinity
. Hence, the point at infinity of
is
. The points of the form
with
and of the form
with
are semi-zero points while ordinary points are of the form
with
and
. A group law can be given for
by the chord and tangent addition law. However, the addition law is not always well-defined when using analytical expressions since there are elements in
that are not invertible modulo
n. To overcome this, the projective coordinates
are used with the equation
. Hence, for any point
P of the elliptic curve
, we have
In this paper, the arithmetic of the new scheme is based on the elliptic curve
with
and
where
with large prime numbers. Consequently, the sum of two points of
is defined with overwhelming probability.
The following result gives an explicit value for the order .
Theorem 4.
Let be an RSA modulus with , , and . For with , let be the elliptic curve with the equation over . Then for any point P on , we have
where satisfies (1) and satisfies (2).
5. The New Scheme
In this section, we present the new scheme and give a small numerical example.
5.1. The New Encryption Scheme
Key generation.
Choose a size for the modulus to guarantee at least 128 security level.
Choose two large integers and of size .
Compute and .
Compute .
If p is not prime, return to Step 2.
Choose two large integers and of size .
Compute and .
Compute .
If q is not prime, return to Step 6.
Compute .
-
Choose an integer
e such that
The pair represents the public key, and represents the private key.
Encryption.
Generate a random integer .
Use the message as .
Compute . The elliptic curve is defined by the equation .
Compute on . The point is the encrypted message.
Decryption.
Compute . The elliptic curve is defined by the equation .
Compute
by one of the formulae (
1), and
by one of the formulae (
2).
Compute .
Compute .
Compute on . The point is the original message.
The role of the random integer r is to serve as the x-coordinate of M on the elliptic curve with the equation . If the same message is encrypted twice, this yields two different couples and , two values and , and then two elliptic curves with different equations.
5.2. Numerical Example
The following is a numerical example with small integers demonstrating the system parameters and a pair of plaintext-ciphertext.
Then, one can compute the following parameters
which shows that the decryption is correct.
5.3. The New Signature Scheme
The encryption scheme can be transformed easily into a signature scheme using a hash function Hash as follows.
As in the encryption scheme, the random number r serves as the x-coordinate of the point on the elliptic curve with the equation .
5.4. The New Signature Scheme
The encryption scheme can be transformed easily into a signature scheme using a hash function Hash as follows.
As in the encryption scheme, the random number r serves as the x-coordinate of the point on the elliptic curve with the equation . Note that r is random, which implies that the signature scheme is probabilistic.
6. Security Analysis
6.1. Resistance against Factorization Methods
When
p and
q are sufficiently large, factoring the RSA modulus
is believed to be hard for all current known factorization algorithms (see [
3,
5] ). Indeed, Pollard’s rho method is not affective since its run time is
and depends on the size of the prime number
p found. This is similar for Lenstra’s Elliptic Curve Method (ECM) for which the run time is
. The Number Field Sieve [
26] is also ineffective for large primes
p and
q. Its run time is
where
c is a constant.
6.2. Resistance against Decomposition as Sum of Two Squares
It is well known that if
with
, then
n can be expressed as the sum of two squares as
. In the new scheme, the modulus is in the form
. Then, the Brahmagupta-Fibonacci identity expresses
n as a sum of two squares in two different ways, namely
Euler observed that if
with
and
, then
where
On the other hand, we have
. It follows that decomposing
n as the sum of two squares in two different ways will give a solution to the equation
with
, and two solutions of the congruence
. This is known to be equivalent to factoring
n as in the quadratic sieve factoring algorithm [
35] and in Rabin’s cryptosystem [
36].
It is also known that by applying the continued fraction algorithm to
, it is possible to find one representation of
n (see [
12]) as
. This leads to one of the systems
This is not sufficient the solve anyone of the two systems. Consequently, the representation of
n as a sum of two squares by the continued fraction method is not sufficient to factor it.
6.3. Resistance against Decomposition as Sum of Four Squares
Lagrange’s four-square theorem states that every positive integer
n is the sum of four squares (Theorem 369 in [
15]), that is
The number of decomposing
n as a such a sum is denoted
, and for odd
n, Jacobi’s four-square theorem formula gives (Proposition 17.7.2 of [
15])
For the modulus
, a specific decomposition as sum of four squares is
Conversely, let
be a decomposition of
n leading to the factorization
. Then
from which we get
Similarly, we have
As the decomposition of
with positive integers
and
satisfying
is unique, then
p can be decomposed as
with integers
r and
s in eight ways, namely
This is also true for
q. Consequently, among the representations of
n as a sum of four squares
, only 64 decompositions can lead to the factorisation of
n by using
This is negligible compared to
, the number of decompositions of a large modulus
as the sum of four squares.
6.4. Resistance against Solving the Order
In RSA, it is well known that solving Euler’s totient function
is equivalent to factoring
. This is also true for solving the order
in the KMOV system. For an elliptic curve
E over a finite ring
with an RSA modulus
n, Martin et al. [
27] proved that computing the order
is as difficult as factoring
n. Moreover, for our scheme, we have the following facts.
Let
be fixed. In our scheme, the order of the elliptic curves
is of the form
with
and
. Assume that the factorization of
n is known. Then one can compute
and
by a specific algorithm to determine the order of an elliptic curve over a finite field such as the Schoof-Elkies-Atkin algorithm [
1]. This implies that
can be computed. Conversely, assume that
is known where
and
. Let
and
such that
Assume that
and
are of the same size so that
and
. Then, if
, we get
, and
Also, if if
, we get
, and
Hence, using Lemma 1, we get
Similarly, assuming that
and
are of the same size with
and
, we get
As a consequence, we have
and
Combining the former inequalities, we get
This implies that the order
is sufficiently large and there is no efficient method to factor it. Hence, finding
p and
q is not feasible in general.
It is important to notice that the work of Kunihiro and Koyama [
22] on the equivalence between factoring
n and counting the number of points on elliptic curves over
does not apply when the order
is known for a fixed
a. The reason is that in [
22] an oracle is needed that count the number of points on every elliptic curve over
, while, in our situation, just
is known.
6.5. Resistance against Small Private Exponent Attacks
The main small private exponent attacks on RSA are based on the key equation . Wiener’s attack is based on the continued fraction algorithm which exploits the approximation . It leads to the factorization of n under the condition . The attack of Boneh and Durfee is based on Coppersmith’s method and exploits the existence of a small solution to the modular equation . It works for .
In the following, we show that the private exponent d in our scheme can be small enough without undermining its security. Typically, it should be larger than while it should be larger than for RSA.
Lemma 5.
Let be an RSA modulus with , , , , and . If d satisfies the key equation where and , then
Proof. Rewrite the key equation in the form
with
,
. We have
Then
Suppose that
and
are of the same bit-size so that
and
. Then
Hence
from which we deduce
Similarly, we get
This leads to
where we used
which is valid since
. Using Lemma 1, we get
This terminates the proof. □
The following result shows that, in regard to Wiener’s attack, the private exponent d can be very small in our scheme comparing to the private exponent in RSA.
Theorem 5. Let be an RSA modulus with , and . Let e be a public exponent such that with , and . If d satisfies the equation with , then one can find d and k in polynomial time.
Proof. The key equation is in the form
with
, and
. Then, Lemma 5 gives
Dividing by
, we get
Using the key equation
, we get
Then
Assuming
, this implies that
. Then (
6) implies
The solutions in
d of the inequality
satisfy
For such solutions, we have
This implies that
can be found amongst the convergents of the continued expansion of
. Since the continued fraction algorithm computes the convergents of
with complexity
, then one finds
k and
d in polynomial time. □
The following result makes use of lattice reduction techniques.
Theorem 6. Let be an RSA modulus with , and . Let e be a public exponent such that with , and . If d satisfies the equation with , then one can find d and k in polynomial time.
Proof. Since
d satisfies an equation of the form
with
,
, we rewrite
where
. Then the key equation can be transformed into the modular equation
We set the bound
for some
. On the other hand, we have
Using (
4) and (
5), and combining with Lemma 1, we get
Then, we set the bound
with
. Now, we can apply Lemma 2 to the equation (
7). It allows to find
k and
s in polynomial time under the condition
. Using
k and
s, one can find
d since
. □
The bound on
d in Theorem 6 is slightly better than the bound in Theorem 5. In both cases, one can find
d and
k which gives
with
,
. By
3, we know that
. This is large enough, and in general is hard to factor when
n is large. Consequently, the method described in [
32] to extract
p and
q can not be applied. As a consequence, finding
p and
q by the continued fraction method, or by lattice reduction techniques when the multiplier
d is small is infeasible.
6.6. Resistance against Discrete Logarithm Problem
The elliptic curve discrete logarithm problem (ECDLP) over a finite field
is the following computational problem:
Given an elliptic curve E over and two points , find an integer x, if any, such that in E. ECDLP is still resistant to several non quantum algorithms and is behind the security of the elliptic curve cryptography (see [
14] for more details).
For an elliptic curve defined over a finite ring such as
where
is an RSA modulus, the elliptic curve discrete logarithm problem can be solved if one knows
p and
q and if one can solve ECDLP in both
and
. Hence, solving ECDLP on
is more difficult. This problem is used to build several elliptic curve based cryptosystems [
11,
19,
20,
24,
33].
One more and crucial fact in our scheme is that a new elliptic curve is generated each time that a message is encrypted. This will make any generic or global discrete logarithm attack on our scheme infeasible.
6.7. Resistance against Isomorphism and Homomorphism Attacks
Let
and
be two elliptic curves with equations
and
, arising from our scheme. Then
and
are isomorphic if and only if
for some
. As in KMOV [
20], it is possible to launch an isomorphism attack on our scheme. Moreover, the encryption and decryption are homomorphic, that is
when using the same elliptic curve. Also, it is possible to launch a homomorphism attack on our scheme, similar to that on KMOV. To overcome the isomorphism as well as the homomorphism attack, a hash function should be applied as shown in the signature scheme 5.4. This is sufficient to make the new scheme immune against the two kind of attacks.
6.8. Other Attacks
There are more attacks in the literature that are related to some elliptic variants of RSA.
In [
2], Bleichenbacher proposed four attacks on KMOV when one of the following situations is satisfied.
The ciphertext and half of the plaintext are known.
Three encryptions of the same message are encrypted with distinct public keys.
Six encryptions of linearly related messages are encrypted with distinct public keys.
Two encryptions of linearly related messages are encrypted with the same public key.
Similarly, in [
23], Kurosawa et al. showed that both the KMOV scheme and Demytko’s scheme are not secure when the same message is encrypted with a suitably large number of distinct keys.
We note that the former attacks are not applicable to our scheme since the encryption process is probabilistic. This implies that, to the contrary of the KMOV scheme and Demytko’s scheme, if we encrypt the same message twice even with the same key in the new scheme, then the cyphertexts are different with a high probability because they depend on a randomly generated number in the encryption phase.
7. Conclusions
We proposed a new variant of RSA with a modulus of the form where p and q are large prime numbers satisfying , , and . The arithmetic of the new scheme uses elliptic curves with equations over the finite ring . The encryption is probabilistic such that each encryption generates a new curve which result in new ciphertext in each call. We analyzed the security of the scheme and show that it is at least as hard as factoring.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Blake, I.; Seroussi, G.; Smart, N. Elliptic curves in cryptography, volume 265 of London Math. Soc. Lecture Note Ser. Cambridge University Press, (1999).
- Bleichenbacher, D. On the security of the KMOV public key cryptosystem, LNCS 1294, Proc. Crypto 97, Springer-Verlag, (1997), pp. 235–-248.
- Brent, R.P. Recent Progress and Prospects for Integer Factorisation Algorithms, In: Du DZ., Eades P., Estivill-Castro V., Lin X., Sharma A. (eds) Computing and Combinatorics. COCOON 2000. Lecture Notes in Computer Science, vol 1858. Springer, Berlin, Heidelberg.
- Boneh, D. Twenty years of attacks on the RSA cryptosystem, Notices Amer. Math. Soc. 46 (2), (1999), pp. 203–213.
- Boneh, D.; Durfee, G.; Howgrave-Graham, N. Factoring N = prq for Large r. In M. Wiener, Ed., Crypto’99, Lecture Notes in Computer Science 1666, Springer- Verlag, (1999), pp. 326–337.
- Boneh, D., Durfee, G. Cryptanalysis of RSA with private key d less than N0.292, Advances in Cryptology-Eurocrypt’99, Lecture Notes in Computer Science Vol. 1592, Springer-Verlag, (1999), pp. 1–11.
- Certicom Research. Standards for efficient cryptography 2: Recommended elliptic curve domain parameters. Standard SEC2, Certicom, 2000.
- T. Collins, D. Hopkins, S. Langford, and M. Sabin. Public Key Cryptographic Apparatus and Method. US Patent #5,848,159. Jan. 1997.
- Coppersmith, D. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10(4), (1997), pp. 233–260.
- Couvreur, C., Quisquater, J.J. Fast Decipherment Algorithm for RSA Public-Key Cryptosystem. Electronics Letters 18, (1982), pp. 905–907.
- Demytko N. A new elliptic curve based analogue of RSA, in T. Helleseth (ed.), EUROCRYPT 1993, Lecture Notes in Computer Science 765, Springer-Verlag, (1994), pp. 40–49.
- Elia, M. Continued Fractions and Factoring, arXiv:1905.10704 (2019) https://arxiv.org/abs/1905.10704.
- A. Fiat, A. Batch RSA, In G. Brassard (ed.), Proceedings of Crypto 1989, vol. 435 of LNCS. Springer-Verlag (1989), pp. 175–185.
- Galbraith, S.D., Gaudry, P. Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78, (2016), pp. 51–72.
- Hardy, G.H., Wright, E.M. An Introduction to Theory of Numbers, 5th Edition, The Clarendon Press Oxford University Press, New York (1979).
- Hinek, M. Cryptanalysis of RSA and its Variants, Chapman & Hall/CRC, Cryptography and Network Security Series, Boca Raton (2009).
- Husemöller, D. Elliptic Curves, 2nd edn., Springer, 2004.
- Ireland, K.; M. Rosen. M. A Classical Introduction to Modern Number Theory, volume 84 of Graduate Texts in Mathematics. Springer-Verlag, 2nd edition (1990).
- Koyama K. Fast RSA type scheme based on singular cubic curve y2 + axy = x3 (mod n). Proc. Eurocrypt’95, Lecture Notes in Computer Science, vo.921, Springer, Berlin, 1995, (1995), pp. 329–339.
- Koyama, K.; Maurer, U.M.; Okamoto, T.; . Vanstone, S.A. New Public-Key Schemes Based on Elliptic Curves over the Ring Zn, CRYPTO 1991, Lecture Notes in Computer Science 576, pp. 252–266.
- Koblitz, N. Elliptic curve cryptosystems. Mathematics of Computation, 48: (1987), pp. 203–209.
- N. Kunihiro N.; Koyama, K. Equivalence between counting the number of points on elliptic curves over the ring Zn and factoring n, LNCS 1403, Proceedings of Eurocrypt 1998, (1998), pp. 47–58.
- Kurosawa, K.; Okada, K.; Tsujii, S. Low exponent attack against elliptic curve RSA, Information Processing Letters, Volume 53, Issue 2, 1995, pp. 77–83.
- Kuwakado, H.; Koyama, K.; and Tsuruoka, Y. A new RSA-type scheme based on singular cubic curves y2 = x3 + bx2 (modn), IEICE Transactions on Fundamentals, vol. E78-A (1995) pp. 27–33.
- Lenstra, H. Factoring integers with elliptic curves, Annals of Mathematics, Vol. 126, (1987), pp. 649–673.
- Lenstra, A.K.; Lenstra, H.W. Jr. The Development of the Number Field Sieve, Lecture Notes in Mathematics 1554, Springer-Verlag (1993).
- Martín, S.; Morillo, P.; Villar, J.L. Computing the order of points on an elliptic curve modulo N is as difficult as factoring N, Applied Mathematics Letters Volume 14, Issue 3, April 2001, (2001), pp. 341–346.
- Miller, V.S. Use of elliptic curves in cryptography. In H. C. Williams, editor, Advances in Cryptology - CRYPTO’85, Vol. 218 of Lecture Notes in Computer Science, Springer-Verlag, (1986), pp. 417–426.
- Nakamoto. S. Bitcoin: A peer-to-peer electronic cash system (2009) https://bitcoin.org/bitcoin.pdf.
- NIST: National Institute of Standards and Technology, Digital Signature Standard, FIPS PUB 186-2 (2000).
- Nitaj, A. Another generalization of Wiener’s attack on RSA, In: Vaudenay, S. (eds.) Africacrypt 2008. LNCS, vol. 5023. . Springer, Heidelberg (2008), pp. 174-–190.
- Nitaj, A.; Fouotsa, E. A new attack on RSA and Demytko’s elliptic curve cryptosystem, Journal of Discrete Mathematical Sciences and Cryptography 22 (3), (2019), pp. 391–409.
- Paillier, P. Trapdooring Discrete Logarithms on Elliptic Curves over Rings. In: Okamoto T. (eds) Advances in Cryptology — ASIACRYPT 2000. ASIACRYPT 2000. Lecture Notes in Computer Science, vol 1976, Springer, Berlin, Heidelberg, (2000), pp. 573–584.
- Pointcheval, D. New public key cryptosystem based on the dependent RSA problem, Eurocrypt’99 Springer-Verlag, 1999, 1592: pp. 239–254.
- Pomerance, C. The quadratic sieve factoring algorithm, Advances in Cryptology, Proc. Eurocrypt’84, LNCS 209, Springer-Verlag, Berlin, (1985), pp. 169-–182.
- Rabin, M.O. Digital signatures and public key functions as intractable as factoring. MIT Technical Report, MIT/LCS/TR-212 (1979).
- Rivest, R., Shamir, A., Adleman, L. A Method for Obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21 (2), (1978), pp. 120–126.
- Schmitt, S.; Zimmer; H.G.; ProQuest (Firm): Elliptic curves : a computational approach, Walter de Gruyter, Berlin, New York (2003).
- Silverman, J.H. The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics, Springer-Verlag, 106 (1986).
- Sun, H.M.; Wu, M.E; Ting, W.C.; Hinek, M.J. Dual RSA and its security analysis, IEEE Transactions on Information Theory, 2007; 53(8), pp. 2922–2933.
- Takagi, T. Fast RSA-type Cryptosystem Modulo pkq. In H. Krawczyk, ed., Proceedings of Crypto 1998, vol. 1462 of LNCS, pp. 318–326. Springer-Verlag, (1998).
- Takayasu, A.; Kunihiro N. General bounds for small inverse problems and its applications to multi-prime RSA, Proc. ICISC 2014, LNCS 8949, Springer (2014), pp. 3–17.
- Washington, L.C. Elliptic Curves: Number Theory and Cryptography. Chapman & Hall/CRC, Florida, 2003.
- de Weger, B. Cryptanalysis of RSA with small prime difference, Applicable Algebra in Engineering, Communication and Computing 13, (2002), pp. 17–28.
- Wiener, M. Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, Vol. 36, (1990), pp. 553–558.
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).