期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
1
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2010年第12期901-906,共6页
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit... Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorithm, for modular multiplicative inverse (MMI). Analysis of the proposed algorithm shows that it is more efficient than the Extended Euclid algorithm (XEA). In addition, if a MMI does not exist, then it is not necessary to use the Backtracking procedure in the proposed algorithm;this case requires fewer operations on every step (divisions, multiplications, additions, assignments and push operations on stack), than the XEA. Overall, XEA uses more multiplications, additions, assignments and twice as many variables than the proposed algorithm. 展开更多
关键词 Extended-Euclid ALGORITHM modular multiplicative inverse Public-Key Cryptography RSA Cryptocol Rabin Information Hiding ALGORITHM ELGAMAL ENCRYPTION/DECRYPTION NTRU Cryptosystem Computer Simulation Low Memory Devices
下载PDF
Space Complexity of Algorithm for Modular Multiplicative Inverse
2
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第6期357-363,共7页
In certain computational systems the amount of space required to execute an algorithm is even more restrictive than the corresponding time necessary for solution of a problem. In this paper an algorithm for modular mu... In certain computational systems the amount of space required to execute an algorithm is even more restrictive than the corresponding time necessary for solution of a problem. In this paper an algorithm for modular multiplicative inverse is introduced and its computational space complexity is analyzed. A tight upper bound for bit storage required for execution of the algorithm is provided. It is demonstrated that for range of numbers used in public-key encryption systems, the size of bit storage does not exceed a 2K-bit threshold in the worst-case. This feature of the Enhanced-Euclid algorithm allows designing special-purpose hardware for its implementation as a subroutine in communication-secure wireless devices. 展开更多
关键词 modular multiplicative inverse Public-Key Encryption SPACE Complexity Tight Upper Bound Extended EUCLID ALGORITHM Prefix Coding Enhanced EUCLID ALGORITHM Custom-Built Circuits
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部