Sciweavers

722 search results - page 3 / 73
» Efficient Generation of Prime Numbers
Sort
View
181 views 116 votes 15 years 4 months ago  CORR 2010»
In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding te...
127 views 123 votes 15 years 8 months ago  EUROCRYPT 1999»
Abstract. We present the first efficient statistical zero-knowledge protocols to prove statements such as: – A committed number is a prime. – A committed (or revealed) number ...
108 views 118 votes 15 years 5 months ago  ICISC 2004»
We consider the generation of prime order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the ...
96 views 156 votes 14 years 10 months ago  JOC 2010»
We consider the generation of prime-order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the ...
130 views 120 votes 15 years 8 months ago  CHES 2001»
A variation of the Complex Multiplication (CM) method for generating elliptic curves of known order over finite fields is proposed. We give heuristics and timing statistics in th...
117 views 138 votes 15 years 1 months ago  CC 2010»
We describe a randomized algorithm that, given an integer a, produces a certificate that the integer is not a pure power of an integer in expected (log a)1+o(1) bit operations unde...
118 views 136 votes 15 years 8 months ago  PKDD 1999»
We describe the problem of mining possibilistic set-valued rules in large relational tables containing categorical attributes taking a finite number of values. An example of such a...
183 views 130 votes 15 years 7 months ago  ASIACRYPT 2006»
Abstract. The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suit...
132 views 122 votes 15 years 3 months ago  PC 1998»
Linear congruential generators (LCGs) remain the most popular method of pseudorandom number generation on digital computers. Ease of implementation has favored implementing LCGs wi...
93 views 140 votes 15 years 9 months ago  PKC 2005»
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...