This paper exhibits an attack with a complexity of roughly 2^{k/2} operations, suggesting that Groth's original choice of parameters was overly aggressive. It also discusses the practicality of this new attack and various implementation issues.
Category / Keywords: public-key cryptography / RSA moduli, hidden order, subgroup, cryptanalysis. Publication Info: An extended abstract will appear at PKC 2011. This is the full version. Date: received 21 Dec 2010 Contact author: mehdi tibouchi at normalesup org Available formats: PDF | BibTeX Citation Version: 20101221:152922 (All versions of this report) Discussion forum: Show discussion | Start new discussion