Abstract.
We present some observations on public-key cryptosystems that use the Chinese remaindering algorithm. Our results imply that careless implementations of such systems could be vulnerable. Only one faulty signature, in some explained context, is enough to recover the secret key.
Article PDF
Similar content being viewed by others
Author information
Authors and Affiliations
Additional information
Received 19 April 1997 and revised 11 February 1998
Rights and permissions
About this article
Cite this article
Joye, M., Lenstra, A. & Quisquater, JJ. Chinese Remaindering Based Cryptosystems in the Presence of Faults . J. Cryptology 12, 241–245 (1999). https://doi.org/10.1007/s001459900055
Published:
Issue Date:
DOI: https://doi.org/10.1007/s001459900055