Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis

被引:0
作者
Zheng, Mengce [1 ,2 ]
Kang, Hao [1 ]
机构
[1] Zhejiang Wanli Univ, Coll Informat & Intelligence Engn, Ningbo, Peoples R China
[2] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu, Peoples R China
来源
CYBERSECURITY | 2024年 / 7卷 / 01期
基金
中国国家自然科学基金;
关键词
Bibliometric analysis; Visualization; Cryptanalysis; Attack; RSA; Lattice; KEY EXPOSURE ATTACKS; IMPROVEMENT; COCITATION; EQUATIONS;
D O I
10.1186/s42400-024-00289-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The RSA (Rivest-Shamir-Adleman) cryptosystem is a widely used public-key cryptographic algorithm in information systems and computer applications. With the advancement of lattice theory, a technique known as the lattice-based method has emerged as a significant threat to RSA and its variants. This paper aims to conduct a bibliometric analysis of publications in the field of lattice-based attacks on RSA-type cryptosystems. The analysis is based on a dataset of relevant publications retrieved from Scopus and utilizes visualization tools such as CiteSpace and VOSviewer for a thorough overview. In order to understand the research developmental trajectory, we analyze the publication trends over the years, explore cooperation networks at various levels, including country/region, institution, and author, and assess the extent of collaboration, contribution, and productivity within the field. Additionally, author co-citation network and reference co-citation clustering are utilized to enable the identification of significant research achievements, cutting-edge developments, and structural framework. Furthermore, we conduct detailed analysis from a keyword perspective to identify research hotspots and emerging trends. The findings contribute to the existing body of knowledge on lattice-based cryptanalysis of RSA-type cryptosystems. Moreover, this bibliometric analysis serves as a valuable resource for identifying fruitful areas for further exploration and guides future research efforts.
引用
收藏
页数:19
相关论文
共 93 条
[1]  
Ajtai M, 1997, P 20 9 ANN ACM S THE, P284, DOI DOI 10.1145/258533.258604
[2]  
Aono Y, 2009, LECT NOTES COMPUT SC, V5443, P34
[3]  
Becker T., 1993, Grbner bases: a computational approach to commutative algebra, V141
[4]  
Blömer J, 2005, LECT NOTES COMPUT SC, V3494, P251
[5]  
Blömer J, 2004, LECT NOTES COMPUT SC, V2947, P1
[6]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2729, P27
[7]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[8]   Cryptanalysis of RSA with private key d less than N0.292 [J].
Boneh, D ;
Durfee, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1339-1349
[9]  
Boneh D., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P326
[10]  
Boneh D., 1999, Not AMS, V46, P203