Breaking Modulus of the form \(N = p^rq^s\) with Improved Polynomial Attacks

نویسندگان

چکیده

Let \(N=p^r q^s\) be prime power moduli where \(p\) and \(q\) are unbalance numbers for \(2 \leq s<r\). If \(q<p<\lambda q\) \(q^s<p^r<\lambda q^s\), and\[\phi(N) \approx \lambda^{\frac{r-s}{2 r}}\left(N^{\frac{r+s}{2 r}+N^{\frac{r+s-2}{2 r}}}\right)-N^{\frac{r+s-1}{2 r}}\left(\lambda^{\frac{r-s+1}{2 r}}+\lambda^{\frac{r-s-1}{2 r}}\right)\]then\[x<\sqrt{\frac{\lambda^{\frac{r-s}{2 r}}+N^{\frac{r+s-2}{2 r}}\right)-N^{\frac{r+s-1}{2 r}}\right)}{2 N^{\frac{1+2 \alpha r}{2 r}}}}\] which leads to the factorization of in polynomial time. The second assaults on s multi described \(N_i=p^r_i q^s_i\) \(i=1,2,..., \omega.\) We use lattice basis reduction techniques obtain parameters (x; yi) or (y; xi) after transforming system equations into a simultaneous Diophantine approximation problem, it resulted \(N_i\)

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Approximation of the n-th Root of a Fuzzy Number by Polynomial Form Fuzzy Numbers

In this paper we introduce the root of a fuzzy number, and we present aniterative method to nd it, numerically. We present an algorithm to generatea sequence that can be converged to n-th root of a fuzzy number.

متن کامل

extensions of some polynomial inequalities to the polar derivative

توسیع تعدادی از نامساوی های چند جمله ای در مشتق قطبی

15 صفحه اول

approximation of the n-th root of a fuzzy number by polynomial form fuzzy numbers

in this paper we introduce the root of a fuzzy number, and we present aniterative method to nd it, numerically. we present an algorithm to generatea sequence that can be converged to n-th root of a fuzzy number.

متن کامل

Symmetry Breaking with Polynomial Delay

A conservative class of constraint satisfaction problems (csps) is a class for which membership is preserved under arbitrary domain reductions. Many well-known tractable classes of csps are conservative. It is well known that lexleader constraints may significantly reduce the number of solutions by excluding symmetric solutions of csps. We show that adding certain lexleader constraints to any i...

متن کامل

Breaking Grain-128 with Dynamic Cube Attacks

We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers. Dynamic cube attacks can create lower degree representations of the given cipher, which makes it possible to attack schemes th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of advances in mathematics and computer science

سال: 2023

ISSN: ['2456-9968']

DOI: https://doi.org/10.9734/jamcs/2023/v38i81788