Constructive Methods for the Generation of Prime Numbers
نویسندگان
چکیده
Public-key cryptography is rapidly becoming ubiquitous in many aspects of “electronic” life. It is used to provide various security services such as data integrity, confidentiality, authentication and nonrepudiation. Most public-key cryptographic methods require the generation of random prime numbers. A naive solution to obtain a prime number consists in randomly choosing a number and testing it for primality. Such a solution is however not satisfactory in all respects as it is not efficient. This note is aimed at making strides towards the provision of practical (i.e., efficient) solutions for generating prime numbers.
منابع مشابه
Generating Provable Primes Efficiently on Embedded Devices
This paper introduces new techniques to generate provable prime numbers efficiently on embedded devices such as smartcards, based on variants of Pocklington’s and the Brillhart-Lehmer-Selfridge-TuckermanWagstaff theorems. We introduce two new generators that, combined with cryptoprocessor-specific optimizations, open the way to efficient and tamper-resistant on-board generation of provable prim...
متن کاملNumerical Investigation of Nanofluid Mixed Convection and Entropy Generation in an Inclined Ventilating Cavity
This paper presents results of a numerical study of mixed convection and entropy generation of Cu–water nanofluid in a square ventilating cavity at different inclination angles. Except a piece of bottom wall with a uniform heat flux, all of the cavity walls are insulated. The inlet port is placed at the bottom of the left wall and the outlet port is positioned at the top of the right wall....
متن کاملGenerating Primes Using Partitions
This paper presents a new technique of generating large prime numbers using a smaller one by employing Goldbach partitions. Experiments are presented showing how this method produces candidate prime numbers that are subsequently tested using either Miller Rabin or AKS primality tests. Introduction Generation of large prime numbers is fundamental to modern cryptography protocols [1],[2], generat...
متن کاملFuzzy Linear Programming and its Application for a Constructive Proof of a Fuzzy Version of Farkas Lemma
The main aim of this paper is to deal with a fuzzy version of Farkas lemma involving trapezoidal fuzzy numbers. In turns to that the fuzzy linear programming and duality theory on these problems can be used to provide a constructive proof for Farkas lemma. Keywords Farkas Lemma, Fuzzy Linear Programming, Duality, Ranking Functions.
متن کاملتاثیر جهت نوردهی روی استحکام باند ریزکششی (Mircotensile) ادهزیوهای نسل پنجم و ششم
Background and Aims: Composite restorative materials and dental adhesives are usually cured with light sources. The light direction may influence the bond strength of dental adhesives. The aim of this study was to evaluate the effect of light direction on the microtensile bond strength of fifth and sixth generation dental adhesives.Materials and Methods: Prime & Bond NT and Clearfil SE bond wer...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001