This paper considers three algorithms for the extraction of square roots of complex integers {called Gaus-sians} using arithmetic based on complex modulus p + iq. These algorithms are almost twice as fast as the analogous algorithms extracting square roots of either real or complex integers in arithmetic based on modulus p, where p is a real prime. A cryptographic system based on these algorithms is provided in this paper. A procedure reducing the computational complexity is described as well. Main results are explained in several numeric illustrations
A new approach is used to implement elliptic curve cryptography (ECC) over prime finite fields. The ...
AbstractWe address the problem of taking cube roots modulo an integer. We generalize two of the fast...
Abstract. We show how to solve a polynomial equation (mod N) of degree k in a single variable z, as...
Abstract. The square root is an important mathematical primitive whose secure, efficient, distribute...
This book is dedicated to descript the Complex Numbers Square-Rooting Unit. In this book a little-kn...
The square root is an important mathematical primitive whose secure, efficient, distributed computat...
International audienceIn 1995, Kuwakado, Koyama and Tsuruoka presented a new RSA-type scheme based o...
Abstract: In this paper, we approach encryption through the properties of complex logarithm and the ...
Lecture Notes in Computer ScienceInternational audienceWe present a variant of the Lagrange-Gauss re...
The Montgomery multiplication is an efficient method for modular arithmetic. Typically, it is used f...
Modular arithmetic over integers is required for many cryptography systems. Montgomeryreduction is a...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryp...
The design of algorithms for sending confidential messages (i.e. messages that no one can read, exce...
Many security algorithms currently in use rely heavily on integer arithmetic modulo prime numbers. G...
A new approach is used to implement elliptic curve cryptography (ECC) over prime finite fields. The ...
AbstractWe address the problem of taking cube roots modulo an integer. We generalize two of the fast...
Abstract. We show how to solve a polynomial equation (mod N) of degree k in a single variable z, as...
Abstract. The square root is an important mathematical primitive whose secure, efficient, distribute...
This book is dedicated to descript the Complex Numbers Square-Rooting Unit. In this book a little-kn...
The square root is an important mathematical primitive whose secure, efficient, distributed computat...
International audienceIn 1995, Kuwakado, Koyama and Tsuruoka presented a new RSA-type scheme based o...
Abstract: In this paper, we approach encryption through the properties of complex logarithm and the ...
Lecture Notes in Computer ScienceInternational audienceWe present a variant of the Lagrange-Gauss re...
The Montgomery multiplication is an efficient method for modular arithmetic. Typically, it is used f...
Modular arithmetic over integers is required for many cryptography systems. Montgomeryreduction is a...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryp...
The design of algorithms for sending confidential messages (i.e. messages that no one can read, exce...
Many security algorithms currently in use rely heavily on integer arithmetic modulo prime numbers. G...
A new approach is used to implement elliptic curve cryptography (ECC) over prime finite fields. The ...
AbstractWe address the problem of taking cube roots modulo an integer. We generalize two of the fast...
Abstract. We show how to solve a polynomial equation (mod N) of degree k in a single variable z, as...