{"id":"https://openalex.org/W4409156265","doi":"https://doi.org/10.1109/trustcom63139.2024.00353","title":"Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus","display_name":"Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus","publication_year":2024,"publication_date":"2024-12-17","ids":{"openalex":"https://openalex.org/W4409156265","doi":"https://doi.org/10.1109/trustcom63139.2024.00353"},"language":"en","primary_location":{"id":"doi:10.1109/trustcom63139.2024.00353","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom63139.2024.00353","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035047037","display_name":"Mahdi Mahdavi","orcid":"https://orcid.org/0000-0002-1951-738X"},"institutions":[{"id":"https://openalex.org/I138847295","display_name":"Universitat Oberta de Catalunya","ror":"https://ror.org/01f5wp925","country_code":"ES","type":"education","lineage":["https://openalex.org/I138847295"]},{"id":"https://openalex.org/I48379061","display_name":"Shahid Beheshti University","ror":"https://ror.org/0091vmj44","country_code":"IR","type":"education","lineage":["https://openalex.org/I48379061"]}],"countries":["ES","IR"],"is_corresponding":true,"raw_author_name":"Mahdi Mahdavi","raw_affiliation_strings":["Universitat Oberta de Catalunya Shahid Beheshti University"],"affiliations":[{"raw_affiliation_string":"Universitat Oberta de Catalunya Shahid Beheshti University","institution_ids":["https://openalex.org/I138847295","https://openalex.org/I48379061"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081398205","display_name":"Navid Abapour","orcid":"https://orcid.org/0000-0003-4293-8518"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Navid Abapour","raw_affiliation_strings":["University of Surrey,Surrey Centre for Cyber Security"],"affiliations":[{"raw_affiliation_string":"University of Surrey,Surrey Centre for Cyber Security","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048904017","display_name":"Zahra Ahmadian","orcid":"https://orcid.org/0000-0001-9356-4064"},"institutions":[{"id":"https://openalex.org/I48379061","display_name":"Shahid Beheshti University","ror":"https://ror.org/0091vmj44","country_code":"IR","type":"education","lineage":["https://openalex.org/I48379061"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Zahra Ahmadian","raw_affiliation_strings":["Shahid Beheshti University,Electrical Engineering Department"],"affiliations":[{"raw_affiliation_string":"Shahid Beheshti University,Electrical Engineering Department","institution_ids":["https://openalex.org/I48379061"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035047037"],"corresponding_institution_ids":["https://openalex.org/I138847295","https://openalex.org/I48379061"],"apc_list":null,"apc_paid":null,"fwci":0.8142,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83683868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2535","last_page":"2540"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.7667140364646912},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6711877584457397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5193408727645874}],"concepts":[{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.7667140364646912},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6711877584457397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5193408727645874}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom63139.2024.00353","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom63139.2024.00353","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W118467740","https://openalex.org/W1515853963","https://openalex.org/W1732427612","https://openalex.org/W1809974132","https://openalex.org/W1984582452","https://openalex.org/W2003155860","https://openalex.org/W2012857639","https://openalex.org/W2019689629","https://openalex.org/W2053464283","https://openalex.org/W2065982804","https://openalex.org/W2071138842","https://openalex.org/W2085856764","https://openalex.org/W2101040389","https://openalex.org/W2101059923","https://openalex.org/W2141040012","https://openalex.org/W2143772938","https://openalex.org/W2166780626","https://openalex.org/W2188283096","https://openalex.org/W2903300949","https://openalex.org/W2916363687","https://openalex.org/W3133748920","https://openalex.org/W3173163182","https://openalex.org/W3177693470","https://openalex.org/W4232836212","https://openalex.org/W4234729980","https://openalex.org/W4252779165","https://openalex.org/W4293817191","https://openalex.org/W4313590982","https://openalex.org/W4386966164","https://openalex.org/W4388797904","https://openalex.org/W4400005965","https://openalex.org/W4403176407","https://openalex.org/W6633485244","https://openalex.org/W6861364217"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2076536433","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W90316445","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109"],"abstract_inverted_index":{"With":[0],"the":[1,16,24,34,45,66,75,89,104,120,134,150,157,179],"increasing":[2],"integration":[3],"of":[4,41,99,160],"crowd":[5],"computing,":[6],"new":[7,97],"vulnerabilities":[8],"emerge":[9],"in":[10,129,156,178],"widely":[11],"used":[12,155],"cryptographic":[13],"systems":[14],"like":[15],"RSA":[17,105,130],"cryptosystem,":[18],"whose":[19],"security":[20],"is":[21,28,146],"based":[22,69],"on":[23,70,103],"factoring":[25,168],"problem.":[26],"It":[27,145],"strongly":[29],"advised":[30],"to":[31,37,51,64,79,124,136,174],"avoid":[32],"using":[33,141],"same":[35],"modulus":[36,53,68,101],"produce":[38],"two":[39,59,85],"pairs":[40],"public-private":[42,113],"keys,":[43],"as":[44],"cryptosystem":[46],"would":[47],"be":[48,154],"rendered":[49],"vulnerable":[50],"common":[52,67,100],"attacks.":[54],"Such":[55],"attacks":[56],"can":[57,118,153],"take":[58],"forms:":[60],"one":[61,71,112],"that":[62,77,149],"aims":[63,78],"factorize":[65],"key":[72,114,122,128],"pair":[73],"and":[74],"other":[76],"decrypt":[80,137],"certain":[81],"ciphertexts":[82],"generated":[83,140],"by":[84],"public":[86,127,143],"keys":[87,90],"if":[88],"are":[91],"co-prime.":[92],"This":[93,132],"paper":[94],"introduces":[95],"a":[96,125,166,175],"type":[98],"attack":[102,152,177],"cryptosystem.":[106],"In":[107,162],"our":[108],"proposed":[109,151],"attack,":[110],"given":[111,126],"pair,":[115],"an":[116,171],"attacker":[117],"obtain":[119],"private":[121],"corresponding":[123],"decryption.":[131],"allows":[133],"adversary":[135],"any":[138],"ciphertext":[139],"this":[142],"key.":[144],"worth":[147],"noting":[148],"CRT":[158],"model":[159],"RSA.":[161],"addition,":[163],"we":[164],"propose":[165],"parallelizable":[167],"algorithm":[169],"with":[170],"order":[172],"equivalent":[173],"cyclic":[176],"worst-case":[180],"scenario.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
