Sciweavers

722 search results - page 2 / 145
» Efficient Generation of Prime Numbers
Sort
View
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
13 years 8 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
AAAI
2007
13 years 7 months ago
Prime Implicates and Prime Implicants in Modal Logic
The purpose of this paper is to extend the notions of prime implicates and prime implicants to the basic modal logic K. We consider a number of different potential definitions of...
Meghyn Bienvenu
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 4 months ago
An LSB Data Hiding Technique Using Natural Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of ...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
ANTS
1998
Springer
139views Algorithms» more  ANTS 1998»
13 years 9 months ago
Generating Arithmetically Equivalent Number Fields with Elliptic Curves
In this note we address the question whether for a given prime number p, the zeta-function of a number field always determines the p-part of its class number. The answer is known t...
Bart de Smit
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 4 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim