{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T11:08:49Z","timestamp":1776078529886,"version":"3.50.1"},"reference-count":26,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Discrete Applied Mathematics"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.dam.2026.03.012","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T08:39:09Z","timestamp":1773650349000},"page":"334-344","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A generalized partial exposure lattice attack against an RSA variant based on cubic Pell curves"],"prefix":"10.1016","volume":"386","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0578-4512","authenticated-orcid":false,"given":"Michel","family":"Seck","sequence":"first","affiliation":[]},{"given":"Hortense Boudjou","family":"Tchapgnouo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.dam.2026.03.012_b1","first-page":"203","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"Boneh","year":"1999","journal-title":"Notices Amer. Math. Soc."},{"key":"10.1016\/j.dam.2026.03.012_b2","series-title":"Advances in Cryptology\u2014EUROCRYPT\u201999: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2\u20136, 1999 Proceedings 18","first-page":"1","article-title":"Cryptanalysis of RSA with private key d less than N0.292","author":"Boneh","year":"1999"},{"key":"10.1016\/j.dam.2026.03.012_b3","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.tcs.2017.09.009","article-title":"A generalized attack on RSA type cryptosystems","volume":"704","author":"Bunder","year":"2017","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.dam.2026.03.012_b4","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"178","article-title":"Finding a small root of a bivariate integer equation; factoring with high bits known","author":"Coppersmith","year":"1996"},{"key":"10.1016\/j.dam.2026.03.012_b5","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"155","article-title":"Finding a small root of a univariate modular equation","author":"Coppersmith","year":"1996"},{"issue":"1","key":"10.1016\/j.dam.2026.03.012_b6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s002000100088","article-title":"Cryptanalysis of RSA with small prime difference","volume":"13","author":"de Weger","year":"2002","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"10.1016\/j.dam.2026.03.012_b7","series-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","first-page":"371","article-title":"Partial key exposure attacks on RSA up to full size exponents","volume":"vol. 3494","author":"Ernst","year":"2005"},{"key":"10.1016\/j.dam.2026.03.012_b8","series-title":"IMA International Conference on Cryptography and Coding","first-page":"131","article-title":"Finding small roots of univariate modular equations revisited","author":"Howgrave-Graham","year":"1997"},{"key":"10.1016\/j.dam.2026.03.012_b9","series-title":"Advances in Cryptology \u2013 CRYPTO \u201991","first-page":"252","article-title":"New public-key schemes based on elliptic curves over the ring ZN","volume":"vol. 576","author":"Koyama","year":"1992"},{"key":"10.1016\/j.dam.2026.03.012_b10","series-title":"International Conference on Information Security","first-page":"55","article-title":"On optimal bounds of small inverse problems and approximate GCD problems with higher degree","author":"Kunihiro","year":"2012"},{"key":"10.1016\/j.dam.2026.03.012_b11","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/BF01457454","article-title":"Factoring polynomials with rational coefficients","volume":"261","author":"Lenstra","year":"1982","journal-title":"Math. Ann."},{"key":"10.1016\/j.dam.2026.03.012_b12","series-title":"New RSA Vulnerabilities Using Lattice Reduction Methods","author":"May","year":"2003"},{"key":"10.1016\/j.dam.2026.03.012_b13","series-title":"An Introduction to Continued Fractions","author":"Moore","year":"1964"},{"key":"10.1016\/j.dam.2026.03.012_b14","series-title":"Number-Theoretic Methods in Cryptology","first-page":"91","article-title":"A novel RSA-like cryptosystem based on a generalization of the r\u00e9dei rational functions","volume":"vol. 10737","author":"Murru","year":"2018"},{"key":"10.1016\/j.dam.2026.03.012_b15","first-page":"89","article-title":"A new public key encryption scheme based on the cubic pell curve using encoding functions","volume":"4","author":"Nitaj","year":"2025","journal-title":"Moroc. J. Algebra Geom. Appl."},{"key":"10.1016\/j.dam.2026.03.012_b16","series-title":"Information Security Practice and Experience","first-page":"98","article-title":"Partial prime factor exposure attacks on RSA and its Takagi\u2019s variant","volume":"vol. 9065","author":"Peng","year":"2015"},{"key":"10.1016\/j.dam.2026.03.012_b17","series-title":"Digitalized Signatures and Public Key Functions as Intractable as Factorization","author":"Rabin","year":"1979"},{"key":"10.1016\/j.dam.2026.03.012_b18","series-title":"Progress in Cryptology - AFRICACRYPT 2025","isbn-type":"print","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-031-97260-7_6","article-title":"Improved cryptanalysis of an RSA variant based on cubic pell curve","author":"Rahmani","year":"2026","ISBN":"https:\/\/id.crossref.org\/isbn\/9783031972607"},{"issue":"2","key":"10.1016\/j.dam.2026.03.012_b19","doi-asserted-by":"crossref","first-page":"40","DOI":"10.3390\/cryptography9020040","article-title":"An improved attack on the RSA variant based on cubic pell equation","volume":"9","author":"Rahmani","year":"2025","journal-title":"Cryptography"},{"key":"10.1016\/j.dam.2026.03.012_b20","series-title":"Progress in Cryptology \u2013 INDOCRYPT 2010","first-page":"2","article-title":"Partial key exposure attack on RSA \u2013 Improvements for limited lattice dimensions","author":"Sarkar","year":"2010"},{"key":"10.1016\/j.dam.2026.03.012_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.tcs.2025.115548","article-title":"A new generalized lattice attack against a family of RSA-like cryptosystems","author":"Seck","year":"2025","journal-title":"Theoret. Comput. Sci.","ISSN":"https:\/\/id.crossref.org\/issn\/0304-3975","issn-type":"print"},{"key":"10.1016\/j.dam.2026.03.012_b22","series-title":"Progress in Cryptology \u2013 AFRICACRYPT 2025","isbn-type":"print","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-031-97260-7_7","article-title":"A new generalized attack on RSA-like cryptosystems","author":"Seck","year":"2026","ISBN":"https:\/\/id.crossref.org\/isbn\/9783031972607"},{"key":"10.1016\/j.dam.2026.03.012_b23","series-title":"Number-Theoretic Methods in Cryptology","first-page":"239","article-title":"A new public key cryptosystem based on the cubic pell curve","author":"Seck","year":"2025"},{"key":"10.1016\/j.dam.2026.03.012_b24","series-title":"International Symposium on Cyber Security, Cryptology, and Machine Learning","first-page":"343","article-title":"A lattice attack against a family of RSA-Like cryptosystems","author":"Te\u015feleanu","year":"2024"},{"key":"10.1016\/j.dam.2026.03.012_b25","series-title":"SageMath, the sage mathematics software system (Version 10.4)","author":"The Sage Developers","year":"2025"},{"issue":"3","key":"10.1016\/j.dam.2026.03.012_b26","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/18.54902","article-title":"Cryptanalysis of short RSA secret exponents","volume":"36","author":"Wiener","year":"1990","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Discrete Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X2600154X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X2600154X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:21:49Z","timestamp":1776075709000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0166218X2600154X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":26,"alternative-id":["S0166218X2600154X"],"URL":"https:\/\/doi.org\/10.1016\/j.dam.2026.03.012","relation":{},"ISSN":["0166-218X"],"issn-type":[{"value":"0166-218X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A generalized partial exposure lattice attack against an RSA variant based on cubic Pell curves","name":"articletitle","label":"Article Title"},{"value":"Discrete Applied Mathematics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dam.2026.03.012","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}]}}