메뉴 건너뛰기




Volumn 2779, Issue , 2003, Pages 243-253

GCD-free algorithms for computing modular inverses

Author keywords

Efficient implementations; Embedded software; GCD algorithms; Modular inverses; Prime numbers; RSA key generation

Indexed keywords

EMBEDDED SOFTWARE; EMBEDDED SYSTEMS; INVERSE PROBLEMS;

EID: 35048825596     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45238-6_20     Document Type: Article
Times cited : (12)

References (12)
  • 2
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • Lecture Notes in Computer Science, Springer-Verlag
    • D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Advances in Cryptology - CRYPTO '97, vol. 1294 of Lecture Notes in Computer Science, pp. 425-439, Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - CRYPTO '97 , vol.1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84966237850 scopus 로고
    • Faster primality testing
    • Lecture Notes in Computer Science, Springer-Verlag
    • W. Bosma and M.-P. van der Hulst. Faster primality testing. In Advances in Cryptology - CRYPTO '89, vol. 435 of Lecture Notes in Computer Science, pp. 652-656, Springer-Verlag, 1990.
    • (1990) Advances in Cryptology - CRYPTO '89 , vol.435 , pp. 652-656
    • Bosma, W.1    Van Der Hulst, M.-P.2
  • 4
    • 0027910992 scopus 로고
    • Generating RSA keys without the Euclid algorithm
    • M.F.A. Derôme. Generating RSA keys without the Euclid algorithm. Electronics Letters 29(1):19-21, 1993.
    • (1993) Electronics Letters , vol.29 , Issue.1 , pp. 19-21
    • Derôme, M.F.A.1
  • 5
    • 85034490362 scopus 로고
    • A cryptographic library for the Motorola DSP 56000
    • Lecture Notes in Computer Science, Springer-Verlag
    • S.R. Dussé and B.S. Kaliski Jr. A cryptographic library for the Motorola DSP 56000. In Advances in Cryptology - EUROCRYPT '90, vol. 473 of Lecture Notes in Computer Science, pp. 230-234, Springer-Verlag, 1991.
    • (1991) Advances in Cryptology - EUROCRYPT '90 , vol.473 , pp. 230-234
    • Dussé, S.R.1    Kaliski Jr., B.S.2
  • 6
    • 35248877014 scopus 로고    scopus 로고
    • Note on fast computation of secret RSA exponents
    • Information Security and Privacy (ACISP 2002), Springer-Verlag
    • W. Fischer and J.-P. Seifert. Note on fast computation of secret RSA exponents. In Information Security and Privacy (ACISP 2002), vol. 2384 of Lecture Notes in Computer Science, pp. 136-143, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2384 , pp. 136-143
    • Fischer, W.1    Seifert, J.-P.2
  • 7
    • 35248881445 scopus 로고    scopus 로고
    • Constructive methods for the generation of prime numbers
    • Egham, UK, September 12-13
    • M. Joye and P. Paillier. Constructive methods for the generation of prime numbers. Proc. of the 2nd NESSIE Workshop, Egham, UK, September 12-13, 2001.
    • (2001) Proc. of the 2nd NESSIE Workshop
    • Joye, M.1    Paillier, P.2
  • 9
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • J.-J. Quisquater and C. Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters 18:905-907, 1982.
    • (1982) Electronics Letters , vol.18 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, Adi Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.