Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhangjie Huang is active.

Publication


Featured researches published by Zhangjie Huang.


Designs, Codes and Cryptography | 2017

Cryptanalysis of Dual RSA

Liqiang Peng; Lei Hu; Yao Lu; Jun Xu; Zhangjie Huang

In 2007, Sun et al. (IEEE Trans Inf Theory 53(8):2922–2933, 2007) presented new variants of RSA, called Dual RSA, whose key generation algorithm outputs two distinct RSA moduli having the same public and private exponents, with an advantage of reducing storage requirements for keys. These variants can be used in some applications like blind signatures and authentication/secrecy. In this paper, we give an improved analysis on Dual RSA and obtain that when the private exponent is smaller than


international conference on progress in cryptology | 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents

Liqiang Peng; Lei Hu; Yao Lu; Santanu Sarkar; Jun Xu; Zhangjie Huang


international conference on cryptology in africa | 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint

Liqiang Peng; Lei Hu; Jun Xu; Zhangjie Huang; Yonghong Xie

N^{0.368}


applied cryptography and network security | 2014

Partial Key Exposure Attacks on Takagi’s Variant of RSA

Zhangjie Huang; Lei Hu; Jun Xu; Liqiang Peng; Yonghong Xie


international conference on information security and cryptology | 2014

Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization

Zhangjie Huang; Lei Hu; Jun Xu

N0.368, the Dual RSA can be broken, where N is an integer with the same bitlength as the modulus of Dual RSA. The point of our work is based on the observation that we can split the private exponent into two much smaller unknown variables and solve a related modular equation on the two unknown variables and other auxiliary variables by making use of lattice based methods. Moreover, we extend this method to analyze the common private exponent RSA scheme, a variant of Dual RSA, and obtain a better bound than previous analyses. While our analyses cannot be proven to work in general, since we rely on some unproven assumptions, our experimental results have shown they work in practice.


information security practice and experience | 2014

Modular Inversion Hidden Number Problem Revisited

Jun Xu; Lei Hu; Zhangjie Huang; Liqiang Peng

In this paper, we analyze the security of two variants of the RSA public key cryptosystem where multiple encryption and decryption exponents are used with a common modulus. For the most well known variant, CRT-RSA, assume that n encryption and decryption exponents


international conference on information security | 2016

Cryptanalysis of Multi-Prime \(\varPhi \)-Hiding Assumption

Jun Xu; Lei Hu; Santanu Sarkar; Xiaona Zhang; Zhangjie Huang; Liqiang Peng


international workshop on security | 2015

Implicit Factorization of RSA Moduli Revisited Short Paper

Liqiang Peng; Lei Hu; Yao Lu; Zhangjie Huang; Jun Xu

e_l,d_{p_l},d_{q_l}


international conference on information security | 2015

Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variant

Liqiang Peng; Lei Hu; Zhangjie Huang; Jun Xu


Designs, Codes and Cryptography | 2018

Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator

Jun Xu; Santanu Sarkar; Lei Hu; Zhangjie Huang; Liqiang Peng

el,dpl,dql, where

Collaboration


Dive into the Zhangjie Huang's collaboration.

Top Co-Authors

Avatar

Jun Xu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Lei Hu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Liqiang Peng

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Xiaona Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yao Lu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yonghong Xie

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Santanu Sarkar

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Li-Ping Wang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Santanu Sarkar

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zeyi Liu

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge