2016 16th International Conference on Control, Automation and Systems (ICCAS) 2016
DOI: 10.1109/iccas.2016.7832500
|View full text |Cite
|
Sign up to set email alerts
|

Advanced method of factorization of multi-bit numbers based on Fermat's theorem in the system of residual classes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(4 citation statements)
references
References 2 publications
0
3
0
1
Order By: Relevance
“…Cybersecurity breaches, a notorious issue, can compromise user data, eroding the trust that takes years to build. Here, the proposed CRT-based NPNS demonstrate superiority by providing a framework that inherently disperses information, making it less susceptible to traditional hacking methods [34,35].…”
Section: Fault Tolerance In E-commerce: Defining the Need And Scopementioning
confidence: 99%
See 1 more Smart Citation
“…Cybersecurity breaches, a notorious issue, can compromise user data, eroding the trust that takes years to build. Here, the proposed CRT-based NPNS demonstrate superiority by providing a framework that inherently disperses information, making it less susceptible to traditional hacking methods [34,35].…”
Section: Fault Tolerance In E-commerce: Defining the Need And Scopementioning
confidence: 99%
“…Furthermore, the CRT finds profound utility in cryptographic communications, an integral element of secure digital transactions [34,60]. It undergirds several cryptographic protocols by enabling secure information transmission over public channels and plays a significant role in algorithms for public key cryptography, such as RSA [35,60].…”
Section: Crt Explanation: Theoretical Insights Into the Chinese Remai...mentioning
confidence: 99%
“…At this level the data collected at the previous two level are grouped and summarized [9]. Decision making frequently require using mathematical models for prediction different characteristics [10][11][12][13][14][15]. In case of uncertain conditions, data-driven models, built on interval approach, are used [16][17][18][19][20][21][22][23][24].…”
Section: Rector Of West Ukrainian National Universitymentioning
confidence: 99%
“…На сьогоднішній день криптосистема Рабіна є однією з найбільш ефективних [1], оскільки для шифрування потрібна лише операція піднесення до квадрату за модулем, а не модулярне експоненціювання, як в асиметричних криптосистемах RSA та Ель-Гамаля [2]. Крім того, її стійкість ґрунтується на проблемі факторизації [3,4] та пошуку квадратичного лишку [5]. Дана операція має субекспоненційну складність [6], тому для забезпечення достатньої стійкості при сьогоднішніх обчислювальних потужностях розрядність числових полів повинна бути більшою 1024 біт [7].…”
unclassified