1984
DOI: 10.1080/0161-118491859060
|View full text |Cite
|
Sign up to set email alerts
|

A Further Weakness in the Common Modulus Protocol for the Rsa Cryptoalgorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

1986
1986
2015
2015

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 0 publications
0
21
0
Order By: Relevance
“…A private exponent can be used to build a straight line program for solving the RSA problem. Conversely, however, it is not clear that a straight line program for solving the RSA problem reveals a private exponent, so the result in this paper is not immediate from [dL84,Mil76].…”
Section: Related Workmentioning
confidence: 67%
See 4 more Smart Citations
“…A private exponent can be used to build a straight line program for solving the RSA problem. Conversely, however, it is not clear that a straight line program for solving the RSA problem reveals a private exponent, so the result in this paper is not immediate from [dL84,Mil76].…”
Section: Related Workmentioning
confidence: 67%
“…Obfuscation seems to be the main new hurdle that this result overcomes. Furthermore, unlike known results [dL84,Mil76], this result is limited to public exponents with small factors.…”
Section: Limitationsmentioning
confidence: 79%
See 3 more Smart Citations