Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 67, 2023 - Issue 6
109
Views
0
CrossRef citations to date
0
Altmetric
Research Article

AN OVERVIEW OF FAST VARIANTS OF THE RSA CRYPTOSYSTEM FOR MODERN CRYPTOGRAPHY APPLICATIONS

References

  • Boneh, D., & Shacham, H. (2002). Fast variants of RSA. CryptoBytes, 5(1), 1–9.
  • Cohen, H. (2013). A course in computational algebraic number theory (Vol. 138). Springer Science & Business Media.
  • Collins, T., Hopkins, D., Langford, S., & Sabin, M. (1998). U.S. Patent No. 5,848,159. U.S. Patent and Trademark Office.
  • El Makkaoui, K., Lamriji, Y., Ouahbi, I., Nabil, O., Bouzahra, A., & Beni-Hssane, A. (2022, December). Fast modular exponentiation methods for public-key cryptography. In 2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet) (pp. 1–6). IEEE. https://doi.org/10.1109/CommNet56067.2022.9993851
  • Fartitchou, M., El Marraki, H., Lafkir, L., Azzouz, A., El Makkaoui, K., & El Allali, Z. (2022, March). Public-key cryptography behind blockchain security. In 2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g/6G-based Interconnected Digital Worlds (NISS) (pp. 1–5). IEEE. https://doi.org/10.1109/NISS55057.2022.10085236
  • Moriarty, K., Kaliski, B., Jonsson, J., & Rusch, A. (2016). PKCS# 1: RSA cryptography specifications version 2.2 (No. rfc8017).
  • Quisquater, J. J., & Couvreur, C. (1982). Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters, 21(18), 905–907. https://doi.org/10.1049/el:19820617
  • Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126. https://doi.org/10.1145/359340.359342
  • Takagi, T. (1998). Fast RSA-type cryptosystem modulo pkq. In Advances in Cryptology—CRYPTO’98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings 18 (pp. 318–326). Springer Berlin Heidelberg. https://doi.org/10.1007/BFb0055738
  • Wang, X., Xu, G., Wang, M., & Meng, X. (2015). Mathematical foundations of public key cryptography. CRC Press.
  • Wiener, M. J. (1990). Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory, 36(3), 553–558. https://doi.org/10.1109/18.54902

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.