Partial Key Exposure Attack
Description. This attack takes as input the modulus R, encryption exponent s, and the least significant digits of the private key partd. The output is either the full private key or in the case when the attack is not successful, the output is "not enough digits to discover d".
Example. The following is an example when the number of digits of the partial key are not enough to discover the private key.
Not enough digits to discover the private key
Example. The following is an example when the number of digits of the partial key enough to discover the private key.
The private key is 15505602836124390721490913495888287004416695