Computer Science ›› 2007, Vol. 34 ›› Issue (2): 86-90.
Previous Articles Next Articles
Online:
Published:
Abstract: Most network-security product needs some cipher algorithm. RSA and ECC perhaps are the main public-key algorithms. This paper deeply investigates the RSA algorithm according to actual project. We discuss almost all the sub-algorithms that contained in RSA
Key words: RSA, Yacobi algorithm, Montgomery algorithm, Addition-Subtraction chains, Miller-Rabin test,Agrawal -Kayal -Saxena test
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I2/86
Cited