相关期刊:《International Journal of Communications, Network and System Sciences》《Journal of Information Security》《International Journal of Extreme Manufacturing》《Journal of Harbin Institute of Technology(New Series)》更多>>
In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integers. Also the proper selection of cryptographic system para...
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit...