We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Shi Ronghua. A Redundant Binary Algorithm for RSA[J]. Journal of Computer Science and Technology, 1996, 11(4): 416-420.
Citation: Shi Ronghua. A Redundant Binary Algorithm for RSA[J]. Journal of Computer Science and Technology, 1996, 11(4): 416-420.

A Redundant Binary Algorithm for RSA

More Information
  • Published Date: July 09, 1996
  • The normal form and modilied normal form for binary redundant representation are defined. A redundant binary algorithm to compute modular exponentiation for very large integers is proposed. It is shown that the proposed algorithm requires the minimum number of basic operations (modular multiplications) among all possible binary redundant representations.
  • [1] Rviest.R.L, Shamir.A, Adleman.L. A method for obtaining digital signatures and public-key cryptosystem. Communication of the ACM, 1978, 21(2): 120-126. ……….
  • Related Articles

    [1]Yun-Ning You, Chang Tang, Zheng Xiao, Xin-Wang Liu, Yuan-Yuan Liu, Xian-Ju Li, Liang-Xiao Jiang. Discriminative Binary Multi-View Clustering[J]. Journal of Computer Science and Technology. DOI: 10.1007/s11390-025-3739-2
    [2]Feng Wang, Guo-Jie Luo, Guang-Yu Sun, Yu-Hao Wang, Di-Min Niu, Hong-Zhong Zheng. Area Efficient Pattern Representation of Binary Neural Networks on RRAM[J]. Journal of Computer Science and Technology, 2021, 36(5): 1155-1166. DOI: 10.1007/s11390-021-0906-y
    [3]Bao-Dong Qin, Ming Li, Fan-Yu Kong. Cryptanalysis of a Type of CRT-Based RSA Algorithms[J]. Journal of Computer Science and Technology, 2008, 23(2): 214-221.
    [4]Shu-Tao Xia. A Note on the Stopping Redundancy of Linear Codes[J]. Journal of Computer Science and Technology, 2006, 21(6): 950-951.
    [5]Jun-Feng Tian, Jun-Wei Zhang, Feng-Xian Wang. Fault Tolerant Algorithm Based on Dynamic and Active Load Balancing for Redundant Services[J]. Journal of Computer Science and Technology, 2004, 19(6).
    [6]Tang Weiyu, Shi Wu, Zang Binxu, Zhu Chuanqi. Exploiting Loop Parallelism with Redundant Execution[J]. Journal of Computer Science and Technology, 1997, 12(2): 105-112.
    [7]Chung-Han CHEN. Embedding Binary Tree in VLSI/WSI Processor Array[J]. Journal of Computer Science and Technology, 1996, 11(3): 326-336.
    [8]L Wei, Liang Youdong. A New Representation and Algorithm for Constructing Convex Hulls in Higher Dim ensional Spaces[J]. Journal of Computer Science and Technology, 1992, 7(1): 1-5.
    [9]Huang Weikang, F.Lombardi. Repairing VLSI/WSI Redundant Memories with Minimum Cost[J]. Journal of Computer Science and Technology, 1990, 5(2): 187-196.
    [10]Zhu Xinjie. On the Structure of Binary Feedforward Inverses with Delay 2[J]. Journal of Computer Science and Technology, 1989, 4(2): 163-171.

Catalog

    Article views (25) PDF downloads (1376) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return