Logo image
Open Research University homepage
Surrey researchers Sign in
Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus
Conference proceeding

Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus

Mahdi Mahdavi, Navid Abapour and Zahra Ahmadian
IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online), (2024), pp.2535-2540
17/12/2024

Abstract

common modulus attack Complexity theory factoring algorithm Privacy Public key rsa vulnerability Side-channel attacks trustworthy computing

Metrics

1 Record Views

Details

Logo image

Usage Policy