Keyword : RSA


Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key
Shixiong WANG Longjiang QU Chao LI Shaojing FU 
Publication:   
Publication Date: 2017/10/01
Vol. E100-A  No. 10 ; pp. 2113-2122
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RSApartial key exposure attacklatticeLLL algorithmCoppersmith's methodunravelled linearization
 Summary | Full Text:PDF(1MB)

An FPGA Implementation for a Flexible-Length-Arithmetic Processor Employing the FDFM Processor Core Approach
Tatsuya KAWAMOTO Xin ZHOU Jacir L. BORDIM Yasuaki ITO Koji NAKANO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/12/01
Vol. E99-D  No. 12 ; pp. 2901-2910
Type of Manuscript:  Special Section PAPER (Special Section on Parallel and Distributed Computing and Networking)
Category: Architecture
Keyword: 
multiple-length-numbersmultiple-length-arithmeticFPGARSAmontgomery modular multiplication
 Summary | Full Text:PDF(667.9KB)

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack
Takeshi SUGAWARA Daisuke SUZUKI Minoru SAEKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/07/01
Vol. E99-A  No. 7 ; pp. 1323-1333
Type of Manuscript:  Special Section PAPER (Special Section on Design Methodologies for System on a Chip)
Category: 
Keyword: 
RSAside-channel attackcollision attackMontgomery multiplication
 Summary | Full Text:PDF(1.7MB)

A New Attack on RSA with Known Middle Bits of the Private Key
Shixiong WANG Longjiang QU Chao LI Shaojing FU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12 ; pp. 2677-2685
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RSAattack with known middle bitsCoppersmith's methodlatticeLLL algorithmunravelled linearization
 Summary | Full Text:PDF(914KB)

Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Atsushi TAKAYASU Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1259-1272
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
latticesCoppersmith's methodsmall rootsimplicit factorizationMulti-Prime Φ-Hiding Assumptionfault attacksdigital signaturesRSA
 Summary | Full Text:PDF(664.5KB)

Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru KUNIHIRO Naoyuki SHINOHARA Tetsuya IZU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1273-1284
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RSAkey-recoverycold boot attackside-channel attackmaximal likelihood
 Summary | Full Text:PDF(570.9KB)

A Unified Framework for Small Secret Exponent Attack on RSA
Noboru KUNIHIRO Naoyuki SHINOHARA Tetsuya IZU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1285-1295
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
LLL algorithmsmall inverse problemRSAlattice-based cryptanalysis
 Summary | Full Text:PDF(521.9KB)

A Noise-Robust Continuous Speech Recognition System Using Block-Based Dynamic Range Adjustment
Yiming SUN Yoshikazu MIYANAGA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/03/01
Vol. E95-D  No. 3 ; pp. 844-852
Type of Manuscript:  PAPER
Category: Speech and Hearing
Keyword: 
CMSCSRDRAnoise-robustRSA
 Summary | Full Text:PDF(1.6MB)

A Configurable On-Chip Glitchy-Clock Generator for Fault Injection Experiments
Sho ENDO Takeshi SUGAWARA Naofumi HOMMA Takafumi AOKI Akashi SATOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 263-266
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
faulty injection attacksclock glitchRSAsafe-error attack
 Summary | Full Text:PDF(1.6MB)

Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order
Sung-Ming YEN Wei-Chih LIEN Chien-Ning CHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/10/01
Vol. E94-A  No. 10 ; pp. 1981-1990
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
doubling attackelliptic curve cryptosystempower analysisRSAside-channel analysissmart cards
 Summary | Full Text:PDF(337.4KB)

Solving Generalized Small Inverse Problems
Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1274-1284
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
LLL algorithmsmall inverse problemRSAlattice-based cryptanalysis
 Summary | Full Text:PDF(231.2KB)

Scan-Based Side-Channel Attack against RSA Cryptosystems Using Scan Signatures
Ryuta NARA Kei SATOH Masao YANAGISAWA Tatsuo OHTSUKI Nozomu TOGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/12/01
Vol. E93-A  No. 12 ; pp. 2481-2489
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Logic Synthesis, Test and Verification
Keyword: 
scan-based side-channel attackscan pathtestabilitycryptosystemRSAsecurity
 Summary | Full Text:PDF(1.2MB)

Key Generation for Fast Inversion of the Paillier Encryption Function
Takato HIRANO Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6 ; pp. 1111-1121
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
Paillier's encryption functionkey generationinversionRSAChinese remainder theorem
 Summary | Full Text:PDF(388.9KB)

An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6 ; pp. 1086-1101
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attacksRSAleakage of stored secretsreplacement attacks
 Summary | Full Text:PDF(7.4MB)

Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 180-187
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
modular multiplicationRSAefficient implementationlow-end devicedouble-size technique
 Summary | Full Text:PDF(234.7KB)

New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
Le Trieu PHONG Kaoru KUROSAWA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 63-75
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
RSAundeniable signatureselective/all conversionstandard model
 Summary | Full Text:PDF(284.6KB)

A Rational Secret-Sharing Scheme Based on RSA-OAEP
Toshiyuki ISSHIKI Koichiro WADA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 42-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
secret sharinggame theoryfairnessRSAOAEP
 Summary | Full Text:PDF(201.3KB)

Simple Backdoors on RSA Modulus by Using RSA Vulnerability
Hung-Min SUN Mu-En WU Cheng-Ta YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/09/01
Vol. E92-A  No. 9 ; pp. 2326-2332
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptographyRSAbackdoorlattice reduction techniqueexhaustive search
 Summary | Full Text:PDF(175.6KB)

A Note on Factoring α-LSBS Moduli
Hung-Min SUN Mu-En WU Cheng-Ta YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 2137-2138
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
Fermat's factorization algorithmcryptographyRSAinteger factorization problemmost-significant bit (MSB)least-significant bit (LSB)
 Summary | Full Text:PDF(61.4KB)

Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1851-1858
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
Montgomery multiplicationdouble-size techniqueRSAefficient implementationsmartcard
 Summary | Full Text:PDF(347.5KB)

Collision-Based Power Attack for RSA with Small Public Exponent
Kouichi ITOH Dai YAMAMOTO Jun YAJIMA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 897-908
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation Issues
Keyword: 
power attackcollision attackSPADPARSAwindow methodcountermeasure
 Summary | Full Text:PDF(748.3KB)

Short-Exponent RSA
Hung-Min SUN Cheng-Ta YANG Mu-En WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/03/01
Vol. E92-A  No. 3 ; pp. 912-918
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RSAencryptiondigital signaturepublic-key cryptosystem
 Summary | Full Text:PDF(216.8KB)

Small Secret Key Attack on a Takagi's Variant of RSA
Kouichi ITOH Noboru KUNIHIRO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 33-41
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
latticeLLLtrivariate polynomialRSA
 Summary | Full Text:PDF(294KB)

Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
Noboru KUNIHIRO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2356-2364
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RSAfactoringLLL algorithm
 Summary | Full Text:PDF(215.6KB)

RSA-Based Password-Authenticated Key Exchange, Revisited
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1424-1438
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Key Management
Keyword: 
password authenticationkey exchangeRSAon-line/off-line attackse-residue attacksprovable security
 Summary | Full Text:PDF(408KB)

Montgomery Multiplication with Twice the Bit-Length of Multipliers
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 203-210
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
Montgomery multiplicationRSAcrypto-coprocessorsmartcard
 Summary | Full Text:PDF(236.2KB)

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/02/01
Vol. E90-A  No. 2 ; pp. 474-490
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authenticated key exchangepasswordson-line and off-line dictionary attacksRSAleakage of stored secretsefficiencyperfect forward secrecy
 Summary | Full Text:PDF(321.4KB)

Efficient Identification of Bad Signatures in RSA-Type Batch Signature
Seungwon LEE Seongje CHO Jongmoo CHOI Yookun CHO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 74-80
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
batch verificationbatch identificationRSA
 Summary | Full Text:PDF(498.2KB)

Generalized Powering Functions and Their Application to Digital Signatures
Hisayoshi SATO Tsuyoshi TAKAGI Satoru TEZUKA Kazuo TAKARAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 81-89
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
factoringRSAmodular powering functiondigital signature
 Summary | Full Text:PDF(236.1KB)

Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange
Shuhong WANG Feng BAO Jie WANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/04/01
Vol. E88-B  No. 4 ; pp. 1641-1646
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
authenticatedkey exchangepasswordRSA(undetectable) dictionary attack
 Summary | Full Text:PDF(91.8KB)

An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT
Yuuki TOMOEDA Hideyuki MIYAKE Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 147-153
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
SPAtiming attackMontgomery multiplicationRSAChinese remainder theorem
 Summary | Full Text:PDF(256.4KB)

On the Strength of the Strong RSA Assumption
Shintaro ITAGAKI Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1164-1170
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
strong RSA assumptionRSAalgebraic computationstraight-line program
 Summary | Full Text:PDF(236.4KB)

A Faster Modular Multiplication Based on Key Size Partitioning for RSA Public-Key Cryptosystem
Seok-Yong LEE Yong-Jin JEONG Oh-Jun KWON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/04/01
Vol. E85-D  No. 4 ; pp. 789-791
Type of Manuscript:  LETTER
Category: Applications of Information Security Techniques
Keyword: 
modular multiplicationRSAcryptographykey size partitioning
 Summary | Full Text:PDF(118.9KB)

A Petri Net Based Public-Key Cryptography: PNPKC
Qi-Wei GE Takako OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/06/01
Vol. E84-A  No. 6 ; pp. 1532-1535
Type of Manuscript:  Special Section LETTER (Special Section on Papers Selected from 2000 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2000))
Category: 
Keyword: 
public-key cryptographyRSAPGPPetri netT-invariant
 Summary | Full Text:PDF(245.2KB)

A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme
Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 77-80
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key exchange schemeOkamoto-TanakaDiffie-HellmanRSAreducibility
 Summary | Full Text:PDF(121.5KB)

On the Number of Messages Which Cannot be Concealed in LUC
Wen-Chung KUO Chi-Sung LAIH Min Jea GAU Chin Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11 ; pp. 2218-2224
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
LUCRSAcryptosystemscryptanalysis
 Summary | Full Text:PDF(562.3KB)

Two Efficient Server-Aided RSA Secret Computation Protocols Against Active Attacks
Shin-Jia HWANG Chin-Chen CHANG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9 ; pp. 1504-1511
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
server-aided secret computationRSAsignaturepassive attacksactive attacks
 Summary | Full Text:PDF(699.3KB)

Information Leakage Measurement in a Distributed Computation Protocol
Shin-ichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 59-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
server-aided secure computationRSAinformation theorysecuritycryptography
 Summary | Full Text:PDF(519.1KB)

New Key Generation Algorithm for RSA Cryptosystem
Ryuichi SAKAI Masakatu MORII Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1 ; pp. 89-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypublic-key cryptosystemRSAkey generation algorithmprimality test
 Summary | Full Text:PDF(693.6KB)

Secure Addition Sequence and Its Application on the Server-Aided Secret Computation Protocols
Chi-Sung LAIH Sung-Ming YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1 ; pp. 81-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
addition sequencecryptographyRSASASCprotocolssecure computations
 Summary | Full Text:PDF(675.2KB)

Extended Key Management System Using Complementary Exponential Calculation
Naoya TORII Takayuki HASEBE Ryota AKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 78-87
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key managementID-basedRSAcomplementary exponential calculation
 Summary | Full Text:PDF(763.9KB)