Computer Science ›› 2007, Vol. 34 ›› Issue (2): 86-90.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Most network-security product needs some cipher algorithm. RSA and ECC perhaps are the main public-key algorithms. This paper deeply investigates the RSA algorithm according to actual project. We discuss almost all the sub-algorithms that contained in RSA

Key words: RSA, Yacobi algorithm, Montgomery algorithm, Addition-Subtraction chains, Miller-Rabin test,Agrawal -Kayal -Saxena test

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!