期刊文献+

左移2进制gcd算法的改进

A refinement of gcd algorithm with binary left shifts
下载PDF
导出
摘要 求两个整数的最大公因子(gcd)是密码学中重要的算法.左移gcd算法是对右移gcd算法在执行效率方面的改进.提出了一个改进的左移2进制gcd算法.分析和实验均表明,改进算法比原算法具有更高的效率. Finding the greatest common divisor (gcd) of two integers is an important algorithm in cryptography. The gcd algorithm with left shifts is an improvement for the one with right shifts in executive efficiency. An improvement of the binary gcd algorithm with left shifts was proposed. The analysis and experiment show the improved algorithm has more efficiency than the old one.
作者 孙燮华
出处 《中国计量学院学报》 2008年第2期154-157,共4页 Journal of China Jiliang University
基金 浙江省自然科学基金资助项目(No.Y607034)
关键词 gcd算法 2进左移 执行效率 gcd algorithm binary left shift
  • 相关文献

参考文献8

  • 1孙燮华.计算机密码学的新进展[J].中国计量学院学报,2001,12(1):1-18. 被引量:5
  • 2PILLAI S U, LIANG B. Blind image deconvolution using a robust GCD approach[J]. IEEE Trans Image Processing, 1999,8 (2) : 295-301.
  • 3孙燮华.关于图像恢复算法的一点注记[J].中国计量学院学报,2007,18(1):59-61. 被引量:1
  • 4KNUTH D. The art of computer programming: seminumerical algorithm[M]. 2nd. USA: Addison-Wesley, 1981: 321-330.
  • 5SCHNEIER B.应用密码学:协议、算法和C源程序[M].2版.吴世忠,译.北京:机械工业出版社,2000:170-171.
  • 6STALLINGS W.密码编码学与网络安全-原理与实践[M].3版.刘玉珍,译.北京:电子工业出版社,2004:101
  • 7BRENT R P. Analysis of the binary euclidean algorithm, in "Algorithms and complexity" [M]. New Youk: Academic Press, 1976:321-355.
  • 8MANDELBAUM D M. New binary euclidean algorithms[J]. Electronics Letters, 1988,24(14) : 857-858.

二级参考文献42

  • 1肖国镇.伪随机序列及其应用[M].北京:国防工业出版社,1985..
  • 2来学嘉.MC公钥密码体制.电子学报,1986,23(4):91-94.
  • 3[6]C.E.Shannon. Communication theory of secrecy systems[J]. Bell System Tech nical Journal, 1949, 28(4): 656-715.
  • 4[7]Lexar Corporation. !An evaluation of the DES." Sep. 1976.
  • 5[8]M.Davio, Y.Desmedt, M.Fossseprez et al. Analytical characteristics of the Data Encryption Standard[A]. Advances in Cryptology, Proceedings of Crypto 83 [[C]. Plenum Press, 1984. 171-202.
  • 6[9]M.Davio, Y.Desmedt, and J.-J.Quisquater. Propagation characteristics of the DES[A]. Advances in Cryptology: Proceedings of EUROCRYPT 84[C]. Springer-V erlag, 1985. 62-73.
  • 7[20]S.W.Golomb. Shift register seauences[M]. San Francisco: Holden-Day, 196 7.
  • 8[30]Cunsheng Ding, Tor Helleseth. On the linear complexity of Legendre sequenc es[J]. IEEE Trans.on Information Theory, 1998, 44(3): 1276-1278.
  • 9[32]M.F.A.Derome. Generating RSA keys without the Euclid algorithm[J]. Elec tron. Lett, 1993, 29(1): 19-21.
  • 10[37]S.A.Vanstone, R.J.Zuccherato. Elliptic curve cryptosystems using curves of smooth order over the ring Z-n[J]. IEEE trans, Information Theory, 1997, 43(4 ): 1231-1237.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部