Research Article
On the Improvement of Wiener Attack on RSA with Small Private Exponent
Table 3
The improvement between each attack.
| Attacks | Boundary | Complexity |
| Wiener Attack | | Polynomial time | V-T Extension | | Exhaustive search for and of bits (see (13)) | Proposed Improvement (Step 1) | |
Exhaustive search for bits (see (24)) | Applying EPF (Step 2) | | Exhaustive search for bits (see (48)) |
|
|