Results 1 
9 of
9
Elliptic Curves And Primality Proving
 Math. Comp
, 1993
"... The aim of this paper is to describe the theory and implementation of the Elliptic Curve Primality Proving algorithm. ..."
Abstract

Cited by 202 (22 self)
 Add to MetaCart
(Show Context)
The aim of this paper is to describe the theory and implementation of the Elliptic Curve Primality Proving algorithm.
Efficient Generation of Prime Numbers
, 2000
"... The generation of prime numbers underlies the use of most publickey schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appearing during various cryptographic setups. Surprisingly, despite decades of intense mathematical studies on primality test ..."
Abstract

Cited by 16 (6 self)
 Add to MetaCart
(Show Context)
The generation of prime numbers underlies the use of most publickey schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appearing during various cryptographic setups. Surprisingly, despite decades of intense mathematical studies on primality testing and an observed progressive intensification of cryptographic usages, prime number generation algorithms remain scarcely investigated and most reallife implementations are of rather poor performance. Common generators typically output a nbit prime in heuristic average complexity O(n^4) or O(n^4/log n) and these figures, according to experience, seem impossible to improve significantly: this paper rather shows a simple way to substantially reduce the value of hidden constants to provide much more efficient prime generation algorithms. We apply our...
GCDFree Algorithms for Computing Modular Inverses
 Cryptographic Hardware and Embedded Systems CHES 2003, Springer LNCS
, 1997
"... Abstract. This paper describes new algorithms for computing a modular inverse e−1 mod f given coprime integers e and f. Contrary to previously reported methods, we neither rely on the extended Euclidean algorithm, nor impose conditions on e or f. The main application of our gcdfree technique is the ..."
Abstract

Cited by 7 (0 self)
 Add to MetaCart
(Show Context)
Abstract. This paper describes new algorithms for computing a modular inverse e−1 mod f given coprime integers e and f. Contrary to previously reported methods, we neither rely on the extended Euclidean algorithm, nor impose conditions on e or f. The main application of our gcdfree technique is the computation of an RSA private key in both standard and CRT modes based on simple modular arithmetic operations, thus boosting reallife implementations on cryptoaccelerated devices.
Fast Generation of Prime Numbers of Portable Devices: An Update
 Proceedings of CHES 2006, LNCS 4249
, 2006
"... Abstract. The generation of prime numbers underlies the use of most publickey cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despite decades of intense mathematical studies on primality testing and an observed progressive intensification of ..."
Abstract

Cited by 6 (2 self)
 Add to MetaCart
(Show Context)
Abstract. The generation of prime numbers underlies the use of most publickey cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despite decades of intense mathematical studies on primality testing and an observed progressive intensification of cryptography, prime number generation algorithms remain scarcely investigated and most reallife implementations are of dramatically poor performance. We show simple techniques that substantially improve all algorithms previously suggested or extend their capabilities. We derive fast implementations on appropriately equipped portable devices like smartcards embedding a cryptographic coprocessor. This allows onboard generation of RSA keys featuring a very attractive (average) processing time. Our motivation here is to help transferring this task from terminals where this operation usually took place so far, to portable devices themselves in near future for more confidence, security, and compliance with networkscaled distributed protocols such as electronic cash or mobile commerce.
Elliptic Curves, Primality Proving And Some Titanic Primes
, 1989
"... We describe how to generate large primes using the primality proving algorithm of Atkin. Figure 1: The Titanic . 1. Introduction. During the last ten years, primality testing evolved at great speed. Motivated by the RSA cryptosystem [3], the first deterministic primality proving algorithm was de ..."
Abstract

Cited by 5 (3 self)
 Add to MetaCart
We describe how to generate large primes using the primality proving algorithm of Atkin. Figure 1: The Titanic . 1. Introduction. During the last ten years, primality testing evolved at great speed. Motivated by the RSA cryptosystem [3], the first deterministic primality proving algorithm was designed by Adleman, Pomerance and Rumely [2] and made practical by Cohen, H. W. Lenstra and A. K. Lenstra (see [9, 10] and more recently [5]). It was then proved that the time needed to test an arbitrary integer N for primality is O((log N) c log log log N ) for some positive constant c ? 0. When implemented on a huge computer, the algorithm was able to test 200 digit numbers in about 10 minutes of CPU time. A few years ago, Goldwasser and Kilian [11], used the theory of elliptic curves over finite fields to give the first primality proving algorithm whose running time is polynomial in log N (assuming a plausible conjecture in number theory). Atkin [4] used the theory of complex multiplicat...
DISTRIBUTED PRIMALITY PROVING AND THE PRIMALITY OF (2^3539+ 1)/3
, 1991
"... We explain how the Elliptic Curve Primality Proving algorithm can be implemented in a distributed way. Applications are given to the certification of large primes (more than 500 digits). As a result, we describe the successful attempt at proving the primality of the lO65digit (2^3539+ l)/3, the fir ..."
Abstract

Cited by 2 (1 self)
 Add to MetaCart
We explain how the Elliptic Curve Primality Proving algorithm can be implemented in a distributed way. Applications are given to the certification of large primes (more than 500 digits). As a result, we describe the successful attempt at proving the primality of the lO65digit (2^3539+ l)/3, the first ordinary Titanic prime.
Short effective intervals containing primes
, 2000
"... We prove that every interval xð1 D1Þ; x contains a prime number with D 28 314 000 and provided xX10 726 905 041: The proof combines analytical, sieve and algorithmical methods. ..."
Abstract
 Add to MetaCart
(Show Context)
We prove that every interval xð1 D1Þ; x contains a prime number with D 28 314 000 and provided xX10 726 905 041: The proof combines analytical, sieve and algorithmical methods.