Search Results - "Extended euclidean algorithm"
-
1
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields
ISSN: 0020-0255, 1872-6291Published: Elsevier Inc 01.02.2020Published in Information sciences (01.02.2020)“… The extended Euclidean algorithm with large-scale polynomials over finite fields is fundamental and widespread in computer science and cryptography, yet it is computationally overloaded…”
Get full text
Journal Article -
2
SPA vulnerabilities of the binary extended Euclidean algorithm
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2017Published in Journal of cryptographic engineering (01.11.2017)“…The execution flow of the binary extended Euclidean algorithm (BEEA) is heavily dependent on its inputs…”
Get full text
Journal Article -
3
Privacy preserving using extended euclidean – algorithm applied to RSA
ISSN: 2815-5637Published: 28.04.2023Published in Tạp chí Khoa học - Trường Đại học Sư phạm Hà Nội 2 (28.04.2023)“… Using the extended Euclidean algorithm is an important and efficient technique for finding the secret key in RSA cryptography…”
Get full text
Journal Article -
4
EXTENDED EUCLIDEAN ALGORITHM OF AUNU BINARY POLYNOMIALS OF CARDINALITY ELEVEN
ISSN: 0973-8975, 2454-7190Published: 24.01.2022Published in Journal of mechanics of continua and mathematical sciences (24.01.2022)“…) using the extended Euclidean algorithm. The polynomials are pairly permuted and the results found showed that one polynomial is a factor of the other polynomial or one polynomial is relatively prime to the other and some gave different results…”
Get full text
Journal Article -
5
Privacy Preserving Using Extended Euclidean Algorithm Applied To RSA-Homomorphic Encryption Technique
ISSN: 2278-3075, 2278-3075Published: 30.08.2019Published in International journal of innovative technology and exploring engineering (30.08.2019)“…[1]. In this paper, Extended Euclidean Algorithm is used for generating keys. This technique follows RSA Homomorphic encryption technique…”
Get full text
Journal Article -
6
The extended Euclidean Algorithm made easy
ISSN: 0025-5572, 2056-6328Published: Cambridge, UK Cambridge University Press 01.03.2016Published in Mathematical gazette (01.03.2016)Get full text
Journal Article -
7
Extended Euclidean Algorithm and CRT Algorithm
ISSN: 1426-2630, 1898-9934Published: Bialystok Versita 01.06.2012Published in Formalized mathematics (01.06.2012)“…In this article we formalize some number theoretical algorithms, Euclidean Algorithm and Extended Euclidean Algorithm [9…”
Get full text
Journal Article -
8
Secure authentication and privacy-preserving blockchain for industrial internet of things
ISSN: 0045-7906Published: Elsevier Ltd 01.05.2023Published in Computers & electrical engineering (01.05.2023)“…Blockchain (BC) technology has overtaken Industrial Internet of Things (IIoT) platforms. It is necessary to explore efficient implementation. Fault tolerance,…”
Get full text
Journal Article -
9
Approaches to performance increasing of extended Euclidean algorithm for double precision division on single precision large integers
ISSN: 2225-5036, 2411-071XPublished: 20.04.2015Published in Ukrainian Scientific Journal of Information Security (20.04.2015)Get full text
Journal Article -
10
Applying systolic multiplication–inversion architectures based on modified extended Euclidean algorithm for GF(2 k ) in elliptic curve cryptography
ISSN: 0045-7906, 1879-0755Published: Elsevier Ltd 01.09.2007Published in Computers & electrical engineering (01.09.2007)“…Elliptic curve cryptography is a very promising cryptographic method offering the same security level as traditional public key cryptosystems (RSA, El Gamal)…”
Get full text
Journal Article -
11
Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited
ISSN: 0018-9448, 1557-9654Published: New York IEEE 01.02.2022Published in IEEE transactions on information theory (01.02.2022)“…Given a binary sequence with length <inline-formula> <tex-math notation="LaTeX">n </tex-math></inline-formula>, determining its minimal rational fraction…”
Get full text
Journal Article -
12
On Computing Modular Multiplicative Inverse
ISSN: 2078-0958, 2078-0966Published: Hong Kong International Association of Engineers 07.07.2021Published in Lecture notes in engineering and computer science (07.07.2021)“… This approach has the advantage that the backward substitutions commonly adopted for the Extended Euclidean Algorithm (EEA) can be avoided…”
Get full text
Journal Article -
13
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data
ISSN: 2168-6750, 2168-6750Published: New York IEEE 01.10.2019Published in IEEE transactions on emerging topics in computing (01.10.2019)“…Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over encrypted data on the cloud. In this paper, a novel…”
Get full text
Journal Article -
14
Polynomial-division-based algorithms for computing linear recurrence relations
ISSN: 0747-7171, 1095-855XPublished: Elsevier Ltd 01.03.2022Published in Journal of symbolic computation (01.03.2022)“…Sparse polynomial interpolation, sparse linear system solving or modular rational reconstruction are fundamental problems in Computer Algebra. They come down…”
Get full text
Journal Article -
15
High Speed and Low Area Complexity Extended Euclidean Inversion Over Binary Fields
ISSN: 0098-3063, 1558-4127Published: New York IEEE 01.08.2019Published in IEEE transactions on consumer electronics (01.08.2019)“… Since inversion is the most expensive finite field arithmetic operation, this paper proposes a novel, fast, and compact inverter over binary fields based on the traditional extended Euclidean algorithm (EEA…”
Get full text
Journal Article -
16
EUCLEAK Side-Channel Attack on the YubiKey 5 Series (Revealing and Breaking Infineon ECDSA Implementation on the Way)
ISSN: 2375-1207Published: IEEE 12.05.2025Published in Proceedings - IEEE Symposium on Security and Privacy (12.05.2025)“…The present work unearths a side-channel vulnerability in the cryptographic library of Infineon Technologies, one of the most important secure element…”
Get full text
Conference Proceeding -
17
A Top-down Approach for Solving Linear Diophantine Equation
ISSN: 2078-0958, 2078-0966Published: Hong Kong International Association of Engineers 03.07.2019Published in Lecture notes in engineering and computer science (03.07.2019)“… Unlike the common approach for applying the Extended Euclidean Algorithm (EEA), we present a top-down approach for finding the unknowns by the sequence of quotients obtained by successive divisions…”
Get full text
Journal Article -
18
A simple and efficient authentication scheme for mobile satellite communication systems
ISSN: 1542-0973, 1542-0981Published: Chichester, UK John Wiley & Sons, Ltd 01.01.2012Published in International journal of satellite communications and networking (01.01.2012)“…SUMMARY In this article, the authors shall propose a simple and efficient authentication scheme for mobile satellite communication systems. The proposed scheme…”
Get full text
Journal Article -
19
Image compression and encryption using chinese remainder theorem
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.06.2019Published in Multimedia tools and applications (01.06.2019)“…The proposed encryption technique uses Chinese Remainder Theorem (CRT) and hash map to generate and distribute secret co-prime keys to participants. It…”
Get full text
Journal Article -
20
Reliable Concurrent Error Detection Architectures for Extended Euclidean-Based Division Over (2^)
ISSN: 1063-8210, 1557-9999Published: New York IEEE 01.05.2014Published in IEEE transactions on very large scale integration (VLSI) systems (01.05.2014)“…The extended Euclidean algorithm (EEA) is an important scheme for performing the division operation in finite fields…”
Get full text
Journal Article