- Applied mathematics
- >
- Cryptography
- >
- Cryptographic attacks
- >
- Attacks on public-key cryptosystems

- Applied mathematics
- >
- Cryptography
- >
- Public-key cryptography
- >
- Attacks on public-key cryptosystems

ROCA vulnerability

The ROCA vulnerability is a cryptographic weakness that allows the private key of a key pair to be recovered from the public key in keys generated by devices with the vulnerability. "ROCA" is an acron

Wiener's attack

The Wiener's attack, named after cryptologist Michael J. Wiener, is a type of cryptographic attack against RSA. The attack uses the continued fraction method to expose the private key d when d is smal

Logjam (computer security)

Logjam is a security vulnerability in systems that use Diffie–Hellman key exchange with the same prime number. It was discovered by a team of computer scientists and publicly reported on May 20, 2015.

Coppersmith's attack

Coppersmith's attack describes a class of cryptographic attacks on the public-key cryptosystem RSA based on the Coppersmith method. Particular applications of the Coppersmith method for attacking RSA

© 2023 Useful Links.