[[abstract]]Modular multiplication plays an important role to several public-key cryptosystems such as the RSA cryptosystem. This paper proposes an efficient modulo $p$ multiplication algorithm with moderate factors of $p$+1 and $p$-1. In order to improve the RSA decryption performance, users can utilize our proposed algorithm and the strong prime criterion. It will prove that the decryption method based on our proposed algorithm can run at a speed almost 6.5 times faster than that of the traditional method, or almost 2 times faster than that of the method based on the Chinese Remainder Theorem. Furthermore, the proposed algorithm can greatly enhance the performance of RSA encryption.[[incitationindex]]SCI[[booktype]]紙
Several modular multiplication algorithms have been reviewed. One modified modulo multiplication alg...
This paper describes a new public-key cryptosystem based on the hardness of computing higher residu...
In this paper, we propose an efficient RSA public key encryption scheme, which is an improved versio...
The services such as electronic commerce, internet privacy, authentication, confidentiality, data in...
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is t...
[[abstract]]This paper proposes an efficient method to implement RSA decryption algorithm. RSA crypt...
This thesis presents methods that can be used to improve the operation of the RSA encryption method....
International audienceThe main operation in RSA encryption/decryption is the modular exponentiation,...
Modern-day computer security relies heavily on cryptography as a means to protect the data that we h...
Number theory has turned out to be one of the useful when it comes to computer security. For instanc...
A large set of moduli, for which the speed of bipartite modular multiplication considerably increase...
IEEE Abstract—This paper proposes two improved interleaved modular multiplication algorithms based o...
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and ...
The security on many public key encryption schemes relied on the intractability of finding the integ...
We revisit the factoring with known bits problem on RSA moduli. In 1996, Coppersmith showed that the...
Several modular multiplication algorithms have been reviewed. One modified modulo multiplication alg...
This paper describes a new public-key cryptosystem based on the hardness of computing higher residu...
In this paper, we propose an efficient RSA public key encryption scheme, which is an improved versio...
The services such as electronic commerce, internet privacy, authentication, confidentiality, data in...
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is t...
[[abstract]]This paper proposes an efficient method to implement RSA decryption algorithm. RSA crypt...
This thesis presents methods that can be used to improve the operation of the RSA encryption method....
International audienceThe main operation in RSA encryption/decryption is the modular exponentiation,...
Modern-day computer security relies heavily on cryptography as a means to protect the data that we h...
Number theory has turned out to be one of the useful when it comes to computer security. For instanc...
A large set of moduli, for which the speed of bipartite modular multiplication considerably increase...
IEEE Abstract—This paper proposes two improved interleaved modular multiplication algorithms based o...
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and ...
The security on many public key encryption schemes relied on the intractability of finding the integ...
We revisit the factoring with known bits problem on RSA moduli. In 1996, Coppersmith showed that the...
Several modular multiplication algorithms have been reviewed. One modified modulo multiplication alg...
This paper describes a new public-key cryptosystem based on the hardness of computing higher residu...
In this paper, we propose an efficient RSA public key encryption scheme, which is an improved versio...