375
Views
22
CrossRef citations to date
0
Altmetric
Articles

Forty years of attacks on the RSA cryptosystem: A brief survey

&
Pages 9-29 | Received 01 Mar 2018, Published online: 27 Feb 2019

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Meryem Cherkaoui Semmouni, Abderrahmane Nitaj & Mostafa Belkasmi. (2022) Cryptanalysis of RSA with smooth prime sum. Journal of Discrete Mathematical Sciences and Cryptography 0:0, pages 1-21.
Read now
Nacer Ghadbane. (2022) On public key cryptosystem based on the word problem in a group. Journal of Discrete Mathematical Sciences and Cryptography 25:6, pages 1563-1568.
Read now
Kritsanapong Somsuk. (2022) The alternative method to speed up RSA’s decryption process. Journal of Discrete Mathematical Sciences and Cryptography 0:0, pages 1-22.
Read now
Ömer Küsmüş & Turgut Hanoymak. (2022) A novel public-key encryption scheme based on Bass cyclic units in integral group rings. Journal of Discrete Mathematical Sciences and Cryptography 25:2, pages 579-589.
Read now
Amandeep Singh Arora, Barkha Bahl & Linesh Raja. (2019) Diverse real-time attack traffic forecasting for cloud platforms. Journal of Discrete Mathematical Sciences and Cryptography 22:4, pages 541-555.
Read now

Articles from other publishers (17)

Santosh Kumar Ravva, K. L. N. C. Prakash & S. R. M. Krishna. (2023) Partial key exposure attack on RSA using some private key blocks. Journal of Computer Virology and Hacking Techniques.
Crossref
Ikhwanul Hakim Masri & Bety Hayat Susanti. (2023) Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem. Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem.
Abderrahmane Nitaj & Tajjeeddine Rachidi. (2023) Applications of Neural Network-Based AI in Cryptography. Cryptography 7:3, pages 39.
Crossref
Antonio Ramírez-de-Arellano, David Orellana-Martín & Mario J. Pérez-Jiménez. (2023) Using Virus Machines to Compute Pairing Functions. International Journal of Neural Systems 33:05.
Crossref
Michele Bufalo, Daniele Bufalo & Giuseppe Orlando. (2023) Some Properties of the Computation of the Modular Inverse with Applications in Cryptography. Computation 11:4, pages 70.
Crossref
Runzhong Yu, Wu Yang & Chengyi Yang. (2022) Differentially Private XGBoost Algorithm for Traceability of Rice Varieties. Applied Sciences 12:21, pages 11037.
Crossref
Wan Nur Aqlili Ruzai, Amir Hamzah Abd Ghafar, Nur Raidah Salim & Muhammad Rezal Kamel Ariffin. (2022) On (Unknowingly) Using Near-Square RSA Primes. Symmetry 14:9, pages 1898.
Crossref
Erkam Luy, Zekeriya Y. Karatas & Olcay Ciftci. (2022) Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”. Information Processing Letters 177, pages 106263.
Crossref
Raza Imam, Faisal Anwer & Mohammad Nadeem. (2022) An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA). International Journal of Information Technology 14:5, pages 2645-2656.
Crossref
Muhammad Waseem Hafiz, Wai-Kong Lee, Seong Oun Hwang, Majid Khan & Asim Latif. (2022) Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality. IEEE Access 10, pages 102119-102134.
Crossref
Raza Imam & Faisal Anwer. 2022. Cyber Security, Privacy and Networking. Cyber Security, Privacy and Networking 185 196 .
Ivan Popchev, Rumen Ketipov & Vera Angelova. (2021) Risk Averseness and Emotional Stability in e-Commerce. Cybernetics and Information Technologies 21:3, pages 73-84.
Crossref
Michele Bufalo, Daniele Bufalo & Giuseppe Orlando. (2021) A Note on the Computation of the Modular Inverse for Cryptography. Axioms 10:2, pages 116.
Crossref
Majid Mumtaz & Luo Ping. (2021) Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method. Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method.
Raza Imam, Qazi Mohammad Areeb, Abdulrahman Alturki & Faisal Anwer. (2021) Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status. IEEE Access 9, pages 155949-155976.
Crossref
Sohaib Moussaid El Idrissi & Omar Khadir. 2021. Advances on Smart and Soft Computing. Advances on Smart and Soft Computing 411 420 .
K. R. Raghunandan, Aithal Ganesh, Shetty Surendra & K. Bhavya. (2020) Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis. Cybernetics and Information Technologies 20:3, pages 86-101.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.