Research Article

On the Improvement of Wiener Attack on RSA with Small Private Exponent

Figure 1

The boundaries of the extensions of the Wiener attack under different computational capabilities, where and are the boundaries of the Wiener attack (W. Attack) and Boneh and Durfee’s attack (B-D. Attack), respectively. , and denote the boundaries of Verheul and Tilborg’s extension (V-T. Ext.) (see [20]), the extension of the Wiener attack (Step 1) (Ext. W.) (see (24)), and the extension of the Wiener attack through EPF (EPF) (see (48)).
650537.fig.001