Results 11 
14 of
14
ACE Encrypt: The Advanced Cryptographic Engine’s Public Key Encryption Scheme ∗
, 2000
"... This document describes the part of the Advanced Cryptographic Engine (ACE) pertaining to public key encryption. It specifies a public key encryption scheme with enough detail to ensure interoperability between different implementations. This scheme is almost as efficient as commercially used scheme ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
This document describes the part of the Advanced Cryptographic Engine (ACE) pertaining to public key encryption. It specifies a public key encryption scheme with enough detail to ensure interoperability between different implementations. This scheme is almost as efficient as commercially used schemes, yet unlike such schemes, can be proven secure under reasonable and welldefined intractability assumptions. A concrete security analysis of the scheme is presented. ∗ Change log:
Factoring Polynomials Modulo Composites
, 1997
"... This paper characterizes all the factorizations of a polynomial with coefficients in the ring Z n where n is a composite number. We give algorithms to compute such factorizations along with algebraic classifications. Contents 1 Introduction 3 1.1 Circuit complexity theory . . . . . . . . . . . . ..."
Abstract
 Add to MetaCart
This paper characterizes all the factorizations of a polynomial with coefficients in the ring Z n where n is a composite number. We give algorithms to compute such factorizations along with algebraic classifications. Contents 1 Introduction 3 1.1 Circuit complexity theory . . . . . . . . . . . . . . . . . . . . . . 3 2 Some Important Tools in Z n [x] 4 2.1 The Z n [x] phenomena . . . . . . . . . . . . . . . . . . . . . . . . 4 2.2 The Chinese Remainder Theorem . . . . . . . . . . . . . . . . . . 5 2.3 Irreducibility criteria in Z p k [x] . . . . . . . . . . . . . . . . . . . 7 2.4 Hensel's Lemma . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.5 A naive approach to factoring . . . . . . . . . . . . . . . . . . . . 11 3 The Case of Small Discriminants 12 3.1 The padic numbers . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.2 Resultants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3 The correspondence to factoring over the padics . . . . ....
Close to Uniform Prime Number Generation With Fewer Random Bits
"... Abstract. In this paper we analyze a simple method for generating prime numbers with fewer random bits. Assuming the Extended Riemann Hypothesis, we can prove that our method generates primes according to a distribution that can be made arbitrarily close to uniform. This is unlike the PRIMEINC algor ..."
Abstract
 Add to MetaCart
Abstract. In this paper we analyze a simple method for generating prime numbers with fewer random bits. Assuming the Extended Riemann Hypothesis, we can prove that our method generates primes according to a distribution that can be made arbitrarily close to uniform. This is unlike the PRIMEINC algorithm studied by Brandt and Damg˚aard and its many variants implemented in numerous software packages, which reduce the number of random bits used at the price of a distribution easily distinguished from uniform. Our new method is also no more computationally expensive than the ones in current use, and opens up interesting options for prime number generation in constrained environments. Keywords: Publickey cryptography, prime number generation, RSA, efficient implementations, random bits. 1
A Sublinear Time Parallel GCD Algorithm for the EREW PRAM
, 2009
"... We present a parallel algorithm that computes the greatest common divisor of two integers of n bits in length that takes O(n log log n / logn) expected time using n 6+ǫ processors on the EREW PRAM parallel model of computation. We believe this to be the first sublinear time algorithm on the EREW PRA ..."
Abstract
 Add to MetaCart
We present a parallel algorithm that computes the greatest common divisor of two integers of n bits in length that takes O(n log log n / logn) expected time using n 6+ǫ processors on the EREW PRAM parallel model of computation. We believe this to be the first sublinear time algorithm on the EREW PRAM for this problem.