New Methods of Generating Primes Secure against Both P - 1 and P + 1 Methods (Special Section on Information Theory and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
Since cryptosystem based on the problem of factoring the composite number N can be attacked with P - 1 and P + 1 methods, it is required that P - 1 and P + 1 should be difficult to be factored into many small primes, where we assume that the P is a factor of N. In this paper, first, we consider the distribution of secure primes against both P - 1 and P + 1 methods. Second, we propose two efficient algorithms for generating secure primes against both P - 1 and P + 1 methods by extending the trial division method.
- 社団法人電子情報通信学会の論文
- 1999-10-25
著者
-
Murakami Y
Forum Advanced Information Technology Murata Machinery Co. Ltd.
-
Kasahara Masao
Department Of Electronics And Information Science Faculty Of Engineering And Design Kyoto Institute
-
MURAKAMI Yasuyuki
Department of Chemistry, University of Tsukuba
-
SATO Yoshizo
Department of Electronics and Information Science, Faculty of Engineering and Design, Kyoto Institut
-
Murakami Yasuyuki
Department Of Chemistry University Of Tsukuba
-
Sato Yoshizo
Department Of Electronics And Information Science Faculty Of Engineering And Design Kyoto Institute
関連論文
- A knapsack public-key cryptosystem with cyclic code over $GF(2)$
- Inflammatory pseudotumor of the appendix
- Gastrointestinal stromal tumor of the rectal mesentery
- Warthin-like tumor variant of papillary thyroid carcinoma : Case report and literature review
- Metastasis to the Forearm Skeletal Muscle from an Adenocarcinoma of the Colon : Report of a Case
- Primary primitive neuroectodermal tumor of the kidney
- Angiomyomatous hamartoma and associated stromal lesions in the right inguinal lymph node : A case report
- Solitary squamous cell papilloma of the lung in a 40-year-old woman with recurrent laryngeal papillomatosis
- Clinicopathologic study of primary gastric lymphoma of B cell phenotype with special reference to low-grade B cell lymphoma of mucosa-associated lymphoid tissue among the Japanese
- On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Scheme (Special Section on Cryptgraphy and Information Security)
- DEVELOPMENT OF CINNAMON-COLORED CL/FR MOUSE, A NEW CONGENIC STRAIN FOR EXPERIMENTAL INVESTIGATION OF CLEFT LIP WITH OR WITHOUT CLEFT PALATE
- Renal Carbonic Anhydrase Activity in DBA/2FG-pcy/pcy Mice with Inherited Polycystic Kidney Disease
- A New Product-Sum Type Public Key Cryptosystem Based on Reduced Bases : Special Section on Cryptography and Information Security
- A New Probabilistic ID-Based Non-interactive Key Sharing Scheme(Special Section on Cryptography and Information Security)
- Fine Needle Aspiration Cytology of Spindle Cell Myoepithelioma in the Submandibular Gland : A case report
- An Upper Bound on Frame Error Rate for Generalized Concatenated Convolutional Codes
- A Method for Evaluating Minimum Free Chernov Distance of Trellis-Codes for Discrete Memoryless Channel (Special Section on Information Theory and Its Applications)
- A Class of Trellis-Codes for Partial Response Channel
- High Rate Binary Coset Code Used for Inner Code
- Multi-Dimensional Block Shaping
- An 8-Dimensional Trellis-Coded 8-PSK with Non-zero Crossing Constraint (Special Section on Information Theory and Its Applications)
- Follicular Mixed B-cell Lymphoma Arising in the Submandibular Gland
- Epithelial Myoepithelial Carcinoma of the Salivary Gland: A case report with immunohistochemical examination and three-dimensional imaging
- Expression of HGF/c-Met Gene and Protein in Odontogenic Tumors.
- Epithelial inclusion cyst (epidermoid cyst) formation with epithelioid cell granuloma in an intrapancreatic accessory spleen
- New Key Generation Algorithm for RSA Cryptosystem (Special Section on Cryptography and Information Security)
- New Product-Sum Type Public-Key Cryptosystems with Selectable Encryption Key Based on Chinese Remainder Theorem
- A New Product-Sum Public-Key Cryptosystem Using Message Extension(Special Section on Information Theory and Its Applications)
- Silylium Ions Stabilized by an Si-X-Si Three-center Bond (X=Halogen or Hydrogen)
- New Methods of Generating Primes Secure against Both P - 1 and P + 1 Methods (Special Section on Information Theory and Its Applications)
- Detection of mRNA for Keratinocyte Growth Factor and its receptor in human burned skin
- Papillary adenocarcinoma of the subvesical duct
- Fundumental Studies on McEliece's Public-Key Cryptosystem
- An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes
- Liver injury model in mice for immunopharmacological study.
- Effect of OKY-046 and ONO-3708 on liver injury in mice.