期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Hardware Architecture for RSA Cryptography Based on Residue Number System
1
作者 郭炜 刘亚灵 +2 位作者 白松辉 魏继增 孙达志 《Transactions of Tianjin University》 EI CAS 2012年第4期237-242,共6页
A parallel architecture for efficient hardware implementation of Rivest Shamir Adleman(RSA) cryptography is proposed.Residue number system(RNS) is introduced to realize high parallelism,thus all the elements under the... A parallel architecture for efficient hardware implementation of Rivest Shamir Adleman(RSA) cryptography is proposed.Residue number system(RNS) is introduced to realize high parallelism,thus all the elements under the same base are independent of each other and can be computed in parallel.Moreover,a simple and fast base transformation is used to achieve RNS Montgomery modular multiplication algorithm,which facilitates hardware implementation.Based on transport triggered architecture(TTA),the proposed architecture is designed to evaluate the performance and feasibility of the algorithm.With these optimizations,a decryption rate of 106 kbps can be achieved for 1 024-b RSA at the frequency of 100 MHz. 展开更多
关键词 residue number system rsa cryptography Montgomery algorithm computer architecture parallelalgorithm
下载PDF
A New Quantum Algorithm for Computing RSA Ciphertext Period 被引量:2
2
作者 WANG Yahui YAN Songyuan ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第1期68-72,共5页
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciph... Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciphertext C.The new algorithm has the following properties:1)recovering the RSA plaintext M from the ciphertext C without factoring n; 2)avoiding the even order of the element; 3)having higher success probability than Shor's; 4)having the same complexity as Shor's. 展开更多
关键词 information security CRYPTOLOGY rsa cryptography quantum computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部