This paper exhibits an attack with a complexity of roughly 2^{k/2} operations, suggesting that Groth's original choice of parameters was overly aggressive. It also discusses the practicality of this new attack and various implementation issues.
Category / Keywords: public-key cryptography / RSA moduli, hidden order, subgroup, cryptanalysis. Publication Info: An extended abstract will appear at PKC 2011. This is the full version. Date: received 21 Dec 2010 Contact author: mehdi tibouchi at normalesup org Available format(s): PDF | BibTeX Citation Version: 20101221:152922 (All versions of this report) Short URL: ia.cr/2010/650 Discussion forum: Show discussion | Start new discussion