2022
DOI: 10.1007/s10559-022-00494-7
|View full text |Cite
|
Sign up to set email alerts
|

Residue Number System Asymmetric Cryptoalgorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Below is an example of calculating the number of irreducible polynomials for n = 32 in GF p , where p = 3, 5, 7,11,13,17,19,23,29,31,37,43:…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Below is an example of calculating the number of irreducible polynomials for n = 32 in GF p , where p = 3, 5, 7,11,13,17,19,23,29,31,37,43:…”
Section: Resultsmentioning
confidence: 99%
“…Recently, with the growth of confidential information and the spread of computer systems, the task of ensuring information security has become increasingly important [1][2][3]. To minimize the risks of unauthorized access, cryptographic methods of information protection are widely used [4,5], which are divided into symmetric and asymmetric [6,7]. In practice, symmetric cryptographic transformations are more common for encrypting large amounts of information, as asymmetric ones are quite laborious [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…With the help of RNS, a reduction in the approximation error is achieved, which makes it possible to increase the efficiency of the circuit calculation. In work [53], the authors propose RNS as the basis of a new asymmetric cryptalgorithm. RNS modules are proposed to be used as secret keys.…”
Section: Introductionmentioning
confidence: 99%