{"id":"https://openalex.org/W4289655023","doi":"https://doi.org/10.1109/isit50566.2022.9834542","title":"Partial Key Exposure Attacks on RSA with Moduli N=p <sup>r</sup> q <sup>s</sup>","display_name":"Partial Key Exposure Attacks on RSA with Moduli N=p <sup>r</sup> q <sup>s</sup>","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289655023","doi":"https://doi.org/10.1109/isit50566.2022.9834542"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834542","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042193450","display_name":"Simeng Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Simeng Yuan","raw_affiliation_strings":["Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002139930","display_name":"Wei Yu","orcid":"https://orcid.org/0000-0003-4522-7340"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yu","raw_affiliation_strings":["Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Cryptology, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100676186","display_name":"Kunpeng Wang","orcid":"https://orcid.org/0000-0002-9412-7867"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunpeng Wang","raw_affiliation_strings":["Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014406366","display_name":"Xiuxiu Li","orcid":"https://orcid.org/0000-0002-2733-9843"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiuxiu Li","raw_affiliation_strings":["Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5042193450"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4391768012"],"apc_list":null,"apc_paid":null,"fwci":0.2098,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.40783337,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1436","last_page":"1440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/moduli","display_name":"Moduli","score":0.5456146001815796},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4863915741443634},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.37348031997680664},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.314825177192688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14986205101013184},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.061613500118255615}],"concepts":[{"id":"https://openalex.org/C121089165","wikidata":"https://www.wikidata.org/wiki/Q6889796","display_name":"Moduli","level":2,"score":0.5456146001815796},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4863915741443634},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.37348031997680664},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.314825177192688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14986205101013184},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.061613500118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834542","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W74636911","https://openalex.org/W83014205","https://openalex.org/W279488099","https://openalex.org/W1503520699","https://openalex.org/W1550863203","https://openalex.org/W1553510179","https://openalex.org/W1598552949","https://openalex.org/W1602764130","https://openalex.org/W1602865989","https://openalex.org/W1749471906","https://openalex.org/W1827261485","https://openalex.org/W1871879997","https://openalex.org/W1961022628","https://openalex.org/W2010504984","https://openalex.org/W2141040012","https://openalex.org/W2147906334","https://openalex.org/W2168676717","https://openalex.org/W2225440610","https://openalex.org/W2296540018","https://openalex.org/W2296614234","https://openalex.org/W2615279577","https://openalex.org/W2798638698","https://openalex.org/W2950288557","https://openalex.org/W3043187028"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2935759653","https://openalex.org/W3105167352","https://openalex.org/W54078636","https://openalex.org/W2954470139","https://openalex.org/W1501425562","https://openalex.org/W2902782467","https://openalex.org/W3084825885","https://openalex.org/W2298861036"],"abstract_inverted_index":{"Many":[0],"fast":[1],"variants":[2],"of":[3,19,40,85,107],"RSA":[4,15],"are":[5,89],"designed":[6],"to":[7,72],"speed":[8],"up":[9],"encryption":[10],"and":[11,33],"decryption.":[12],"Prime":[13],"power":[14],"(PP-RSA)":[16],"is":[17,25,98],"one":[18],"the":[20,38,73,76,81,86,99],"most":[21,77],"important":[22],"variants.":[23],"It":[24],"widely":[26],"used":[27],"in":[28,94],"electronic":[29],"money":[30],"trading":[31],"systems":[32],"high-speed":[34],"programs.":[35],"At":[36],"present,":[37],"security":[39],"PP-RSA":[41,108],"with":[42,109],"moduli":[43,110],"N":[44,111],"=":[45,112],"p":[46,113],"<sup":[47,51,114,118],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[48,52,115,119],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">r</sup>":[49,116],"q":[50,117],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">s</sup>":[53,120],"has":[54],"not":[55],"been":[56],"fully":[57],"studied.":[58],"In":[59],"this":[60],"paper,":[61],"we":[62],"give":[63],"three":[64],"powerful":[65],"attacks":[66,92,106],"based":[67],"on":[68,102],"Coppersmith\u2019s":[69],"method,":[70],"applying":[71],"cases":[74],"when":[75],"significant":[78,83],"bits":[79,84],"or":[80],"least":[82],"private":[87],"key":[88,104],"known.":[90],"Our":[91],"work":[93,101],"polynomial":[95],"time.":[96],"This":[97],"first":[100],"partial":[103],"exposure":[105],".":[121]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
