-
1
Comparative analysis of integer factorization algorithms
Published 2015-10-01Subjects: “…integer factorization…”
Get full text
Article -
2
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01Subjects: Get full text
Article -
3
Scheme of extending elliptic curve method to three phases
Published 2018-12-01Subjects: “…integer factorization…”
Get full text
Article -
4
Further research on public-key cryptosystems based on third-order recurrence sequence
Published 2005-01-01Subjects: Get full text
Article -
5
Factorization of big integer and the security of RSA
Published 2017-05-01“…Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.…”
Get full text
Article -
6
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01“…Two hard problems have been widely used in public-key cryptography: integer factorization and the discrete logarithm problem. …”
Get full text
Article -
7
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01“…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
Get full text
Article