Primality tests and use of primes in public key systems

被引:1
|
作者
Landrock, P [1 ]
机构
[1] Aarhus Univ, Inst Math, DK-8000 Aarhus, Denmark
来源
LECTURES ON DATA SECURITY | 1999年 / 1561卷
关键词
D O I
10.1007/3-540-48969-X_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the first part of this discussion, we first briefly discuss various prime generation methods, starting with the Rabin-Miller test, and then moving on to a very simple new deterministic test. After that we discuss various ways of constructing so-called strong primes, and why this better be avoided.
引用
收藏
页码:127 / 133
页数:7
相关论文
共 50 条
  • [21] PUBLIC-KEY SYSTEMS
    BRASSARD, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 20 - 39
  • [22] Primality tests based on Fermat's Little Theorem
    Agrawal, Manindra
    Distributed Computing and Networking, Proceedings, 2006, 4308 : 288 - 293
  • [23] Deterministic primality tests based on tori and elliptic curves
    Gurevich, Alexander
    Kunyavskii, Boris
    FINITE FIELDS AND THEIR APPLICATIONS, 2012, 18 (01) : 222 - 236
  • [24] Primality tests, linear recurrent sequences and the Pell equation
    Bazzanella, Danilo
    Scala, Antonio Di
    Dutto, Simone
    Murru, Nadir
    RAMANUJAN JOURNAL, 2022, 57 (02): : 755 - 768
  • [25] FAST PRIMALITY TESTS FOR NUMBERS LESS THAN 50.109
    KURTZ, GC
    SHANKS, D
    WILLIAMS, HC
    MATHEMATICS OF COMPUTATION, 1986, 46 (174) : 691 - 701
  • [26] Primality tests, linear recurrent sequences and the Pell equation
    Danilo Bazzanella
    Antonio Di Scala
    Simone Dutto
    Nadir Murru
    The Ramanujan Journal, 2022, 57 : 755 - 768
  • [27] Public-key security systems
    Univ of New Orleans, New Orleans, United States
    IEEE Micro, 3 (10-13):
  • [28] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [29] Public key infrastructure in mobile systems
    Dankers, J
    Garefalakis, T
    Schaffelhofer, R
    Wright, T
    ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2002, 14 (05): : 180 - 190
  • [30] An Analysis of Non-Elliptic Curve Based Primality Tests
    Wong, William
    Alomari, Zakaria
    Lai, Hon Ching
    Li, Zhida
    Ullah, Arif
    2024 8TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2024, 2024, : 53 - 58