文章詳目資料

International Journal of Science and Engineering

  • 加入收藏
  • 下載文章
篇名 Algorithm Designs and Complexity Analyses for Information Security
卷期 4:1
作者 Chia-Long Wu
頁次 001-004
出刊日期 201403
DOI 10.6159/IJSE.2014.(4-1).01

中文摘要

英文摘要

Modular exponentiation is composed of repetition of modular multiplication and is often the dominant part of modern cryptographic method. Taking the RSA cryptosystem for example, both the encryption and decryption operations are accomplished by modular exponentiation. It is performed by using successive modular multiplications. Exponentiation is to compute ME for a positive integer E and modular exponentiation is to compute ME mod N for positive integers E and N. When the lengths of the operators are at least 512 up to 2048 binary representations, modular exponentiation can be time-consuming and is often the dominant part of the computation in many computer systems. In this paper, I will describe some methods, which use some software. Most importantly, I will analyze the computational complexities for these methods respectively.

本卷期文章目次

關鍵知識WIKI

相關文獻