New Methods of Generating Primes Secure against Both P - 1 and P + 1 Methods (Special Section on Information Theory and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
Since cryptosystem based on the problem of factoring the composite number N can be attacked with P - 1 and P + 1 methods, it is required that P - 1 and P + 1 should be difficult to be factored into many small primes, where we assume that the P is a factor of N. In this paper, first, we consider the distribution of secure primes against both P - 1 and P + 1 methods. Second, we propose two efficient algorithms for generating secure primes against both P - 1 and P + 1 methods by extending the trial division method.
- 社団法人電子情報通信学会の論文
- 1999-10-25
著者
-
Murakami Y
Forum Advanced Information Technology Murata Machinery Co. Ltd.
-
Kasahara Masao
Department Of Electronics And Information Science Faculty Of Engineering And Design Kyoto Institute
-
MURAKAMI Yasuyuki
Department of Chemistry, University of Tsukuba
-
SATO Yoshizo
Department of Electronics and Information Science, Faculty of Engineering and Design, Kyoto Institut
-
Murakami Yasuyuki
Department Of Chemistry University Of Tsukuba
-
Sato Yoshizo
Department Of Electronics And Information Science Faculty Of Engineering And Design Kyoto Institute
関連論文
- A knapsack public-key cryptosystem with cyclic code over $GF(2)$
- Inflammatory pseudotumor of the appendix
- Gastrointestinal stromal tumor of the rectal mesentery
- Warthin-like tumor variant of papillary thyroid carcinoma : Case report and literature review
- Metastasis to the Forearm Skeletal Muscle from an Adenocarcinoma of the Colon : Report of a Case
- Primary primitive neuroectodermal tumor of the kidney
- Angiomyomatous hamartoma and associated stromal lesions in the right inguinal lymph node : A case report
- Solitary squamous cell papilloma of the lung in a 40-year-old woman with recurrent laryngeal papillomatosis
- Clinicopathologic study of primary gastric lymphoma of B cell phenotype with special reference to low-grade B cell lymphoma of mucosa-associated lymphoid tissue among the Japanese
- On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Scheme (Special Section on Cryptgraphy and Information Security)