ISBN : 978-3-642-30056-1International audienceThis paper introduces new techniques to generate provable prime numbers efficiently on embedded devices such as smartcards, based on variants of Pocklington's and the Brillhart-Lehmer-Selfridge-Tuckerman-Wagstaff theorems. We introduce two new generators that, combined with cryptoprocessor-specific optimizations, open the way to efficient and tamper-resistant on-board generation of provable primes. We also report practical results from our implementations. Both our theoretical and experimental results show that constructive methods can generate provable primes essentially as efficiently as state-of-the-art generators for probable primes based on Fermat and Miller-Rabin pseudo-tests. We evaluate ...
Blum-Blum-Shub (BBS) is a (probabilistically) secure pseudorandom bit/number generator which outputs...
Abstract- This study presents primality testing by mostly emphasizing on probabilistic primality tes...
International audienceIn this paper, we analyze several variants of a simple method for generating p...
ISBN : 978-3-642-30056-1International audienceThis paper introduces new techniques to generate prova...
Abstract. The generation of prime numbers underlies the use of most public-key cryptosystems, essent...
Computer encryption are based mostly on primes, which are also vital for communications. The aim of ...
This paper investigates existing prime generation algorithms on small portable devices, makes optimi...
AbstractWe present a prime certification method which permits shorter certificates of primality than...
. The purpose of this paper is to justify the claim that a method for generating primes presented at...
Public-key cryptography is rapidly becoming ubiquitous in many aspects of "electronic" lif...
Safe primes and safe RSA moduli are used in several cryptographic schemes. The most common notion is...
Abstract. We here consider the protection of prime number generation against Side-Channel Attacks. I...
Since the discovery of the RSA encryption scheme, primality domain has gained much interest. For the...
With the boom in information technology and the penetration of these technologies in an increasing n...
In this day and age, security is regarded of high importance when dealing with confidential informat...
Blum-Blum-Shub (BBS) is a (probabilistically) secure pseudorandom bit/number generator which outputs...
Abstract- This study presents primality testing by mostly emphasizing on probabilistic primality tes...
International audienceIn this paper, we analyze several variants of a simple method for generating p...
ISBN : 978-3-642-30056-1International audienceThis paper introduces new techniques to generate prova...
Abstract. The generation of prime numbers underlies the use of most public-key cryptosystems, essent...
Computer encryption are based mostly on primes, which are also vital for communications. The aim of ...
This paper investigates existing prime generation algorithms on small portable devices, makes optimi...
AbstractWe present a prime certification method which permits shorter certificates of primality than...
. The purpose of this paper is to justify the claim that a method for generating primes presented at...
Public-key cryptography is rapidly becoming ubiquitous in many aspects of "electronic" lif...
Safe primes and safe RSA moduli are used in several cryptographic schemes. The most common notion is...
Abstract. We here consider the protection of prime number generation against Side-Channel Attacks. I...
Since the discovery of the RSA encryption scheme, primality domain has gained much interest. For the...
With the boom in information technology and the penetration of these technologies in an increasing n...
In this day and age, security is regarded of high importance when dealing with confidential informat...
Blum-Blum-Shub (BBS) is a (probabilistically) secure pseudorandom bit/number generator which outputs...
Abstract- This study presents primality testing by mostly emphasizing on probabilistic primality tes...
International audienceIn this paper, we analyze several variants of a simple method for generating p...