Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Liqiang Peng is active.

Publication


Featured researches published by Liqiang Peng.


Designs, Codes and Cryptography | 2017

Cryptanalysis of Dual RSA

Liqiang Peng; Lei Hu; Yao Lu; Jun Xu; Zhangjie Huang

In 2007, Sun et al. (IEEE Trans Inf Theory 53(8):2922–2933, 2007) presented new variants of RSA, called Dual RSA, whose key generation algorithm outputs two distinct RSA moduli having the same public and private exponents, with an advantage of reducing storage requirements for keys. These variants can be used in some applications like blind signatures and authentication/secrecy. In this paper, we give an improved analysis on Dual RSA and obtain that when the private exponent is smaller than


international conference on progress in cryptology | 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents

Liqiang Peng; Lei Hu; Yao Lu; Santanu Sarkar; Jun Xu; Zhangjie Huang


international conference on cryptology in africa | 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint

Liqiang Peng; Lei Hu; Jun Xu; Zhangjie Huang; Yonghong Xie

N^{0.368}


applied cryptography and network security | 2014

Partial Key Exposure Attacks on Takagi’s Variant of RSA

Zhangjie Huang; Lei Hu; Jun Xu; Liqiang Peng; Yonghong Xie


international conference on information security and cryptology | 2016

An Improved Analysis on Three Variants of the RSA Cryptosystem

Liqiang Peng; Lei Hu; Yao Lu; Hongyun Wei

N0.368, the Dual RSA can be broken, where N is an integer with the same bitlength as the modulus of Dual RSA. The point of our work is based on the observation that we can split the private exponent into two much smaller unknown variables and solve a related modular equation on the two unknown variables and other auxiliary variables by making use of lattice based methods. Moreover, we extend this method to analyze the common private exponent RSA scheme, a variant of Dual RSA, and obtain a better bound than previous analyses. While our analyses cannot be proven to work in general, since we rely on some unproven assumptions, our experimental results have shown they work in practice.


information security practice and experience | 2014

Modular Inversion Hidden Number Problem Revisited

Jun Xu; Lei Hu; Zhangjie Huang; Liqiang Peng

In this paper, we analyze the security of two variants of the RSA public key cryptosystem where multiple encryption and decryption exponents are used with a common modulus. For the most well known variant, CRT-RSA, assume that n encryption and decryption exponents


Journal of Mathematical Cryptology | 2017

Cryptanalysis of an RSA variant with moduli N=prql

Yao Lu; Liqiang Peng; Santanu Sarkar


Iet Communications | 2013

Analysis of two knapsack public key cryptosystems

Liqiang Peng; Lei Hu; Jun Xu; Yonghong Xie; Jinyin Zuo

e_l,d_{p_l},d_{q_l}


international conference on information security and cryptology | 2016

Improved Results on Cryptanalysis of Prime Power RSA

Liqiang Peng; Lei Hu; Yao Lu


international conference on information security | 2016

Cryptanalysis of Multi-Prime \(\varPhi \)-Hiding Assumption

Jun Xu; Lei Hu; Santanu Sarkar; Xiaona Zhang; Zhangjie Huang; Liqiang Peng

el,dpl,dql, where

Collaboration


Dive into the Liqiang Peng's collaboration.

Top Co-Authors

Avatar

Lei Hu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jun Xu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zhangjie Huang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yao Lu

University of Tokyo

View shared research outputs
Top Co-Authors

Avatar

Rui Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Xiaona Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yonghong Xie

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Santanu Sarkar

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dongdai Lin

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge