eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2000/016

Cryptanalysis of RSA with small prime difference

Benne de Weger

Abstract

We show that choosing an RSA modulus with a small difference of its prime factors yields improvements on the small private exponent attacks of Wiener and Boneh-Durfee.

Note: This paper is withdrawn from this archive for copyright reasons. Preprints can be obtained from the author, send a message to deweger@xs4all.nl

Metadata
Available format(s)
-- withdrawn --
Category
Public-key cryptography
Publication info
Published elsewhere. Accepted for publication in Applicable Algebra in Engineering, Communication and Computing
Keywords
CryptanalysisRSAFermat FactoringWiener AttackBoneh-Durfee Attack
Contact author(s)
deweger @ xs4all nl
History
2001-06-19: withdrawn
2000-05-02: received
See all versions
Short URL
https://ia.cr/2000/016
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.