Last Modified: 2023-10-12 13:19:19Z
2. Attack
2.3. when d is leaked
e = pow(d, -1, n)
2.4. Textbook RSA
when p and q is known, because it is used in textbooks.
7. See Also
Homomorphism in RSA https://ufo.stealien.com/2022-06-08/homomorphism-in-rsa
A year of CTF RSA https://party4bread.github.io/a-year-of-ctf-rsa/