Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA》 2000-01
Add to Favorite Get Latest Update

Recursive Sums of Residues Algorithm Based on Binary Redundant Representations

Chen Yun Gong Yaohuan (Institute of Telecommunication & Information Engineering, Institute of Electronic Engineering,UEST of China Chengdu 610054)  
Recursive sums of residues algorithm(RSR algorithm) is briefly introduced in this paper An improved RSR algorithm is presented, which bases on binary redundant representations (BRR algorithm). It is shown by theoretical analysis that the proposed algorithm decreases the recursive steps by 17.2% on average. Compared with traditional BR algorithm, the new algorithm obtains the speed improvement by about 58.6% on average.
【Fund】: 电子部预研基金
【CateGory Index】: TN911.2
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 TANG Yong~1 XU Jin-ling~1 (1.College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066004, China);A new fast modular multiplication algorithm[J];Journal of Yanshan University;2007-06
2 CHEN Yun1,WU Zhen1,CHEN Jun1,WAN Wu-nan1,and L Yong-qi2 (1. Information Security Institute,Chengdu University of Information Technology Chengdu 610225; 2. State Key Laboratory of Modern Telecommunication Chengdu 610041 );Implementation of Equivalent Power Consumption Coding Secure Against Side Channel Attack[J];Journal of University of Electronic Science and Technology of China;2008-02
3 DU Zhi-bo, CHEN Yun, WU Zhen, CHEN Jun, ZHOU Li-sha (Information Security Institute, Chengdu University of Information Technology, Chengdu 610225);Implementation Algorithm of Pseudo Modular Inversion Secure Against Side Channel Attack[J];Computer Engineering;2010-03
4 ZHOU Li-sha,CHEN Yun,WU Zhen,CHEN Jun,DU Zhi-bo(Information Security Institute,Chengdu University of Information Technology,Chengdu 610225);SDPA Attack on Exponent of Modulo Exponentiation in Real Environment[J];Computer Engineering;2010-07
5 Xu Wanfu Hou Huifang(Information Science and Engineering Institute,Henan University of Technology,Zhengzhou 450001);A New Fast RSA Algorithm[J];Computer & Digital Engineering;2009-05
6 XIEQi(School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310036, China);A Modular Exponentiation Algorithm Based on Variable Radix[J];Bulletin of Science and Technology;2003-03
7 WANG Gang(Guangdong China Mobile Company,Guangzhou 510623,China);On the Application of Efficient Algorithm of RSA Code System in Mobile Communications[J];Journal of Southern Vocational Education;2012-04
8 XU Jin-ling,TANG Yong,YANG Hua-ling(College of Information Science and Engineering,Yanshan University,Qinhuangdao 066004,China);Dynamic combined RSA algorithm[J];Computer Engineering and Design;2006-13
9 Chen Yun Gong Yaohuan (Communications Institute, UEST of China, Chengdu 610054);Approach on Fast RSA Algorithms[J];;2000-03
10 TANG Yong,XU Jin-ling(The College of Information Science and Engineering,Yanshan University,Qinhuangdao 066004,China);Efficient Algorithms for RSA Cryptosystem Implementation[J];Microprocessors;2007-03
【Citations】
Chinese Journal Full-text Database 3 Hits
1 Chen Yum (Dept. of Electronic Tech. , UEST of China Chengdu 610054);A New Fast RSA Algorithm[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1995-S2
2 Chen Yun (Dept.of Electronic Tech.,UEST of China Chengdu 610054);An Improved Algorithm for RSA Based on Symmetry of Modulo Multiplication[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1997-05
3 Chen Yun(UEST of China Chengdu 610054);Analysis on Recursive Sum of Residues[J];;1995-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 TIAN Ying,WANG Li-jun,ZHANG Xue-dong,LIU Yue(School of Computer Science and Engineering,Anshan University of Science and Technology,Anshan 114044,China);A Combined High-Speed RSA Algorithm[J];Journal of Anshan Institute of Iron and Steel Technology;2002-05
2 LIU Liang,LIU Yun,NING Hong-zhou(School of Electronics and Information Engineering,Beijing Jiaotong University,Beijing 100044,China);Improvement and Characteristic Research of Chebyshev Polynomials in PKI[J];Journal of Northern Jiaotong University;2005-05
3 CUI Xiaoyu CHENG Qiansheng (School of Mathematical Science,Peking University,Beijing,100871);Asymmetric Digital Watermark[J];Acta Scicentiarum Naturalum Universitis Pekinesis;2001-05
4 KUANG Wei\ ZHANG Xiao lin HU Yi (Beijing University of Aeronautics and Astronautics, Dept. of Electronic Engineering);Scheme of Secure Telemetry Data Transmitting System Using in Certain UAV System[J];Journal of Beijing University of Aeronautics and Astronautics;2002-01
5 LIU Jinga,CHENG Chaob,LI Da-weic(a.College of Mathematics;b.College of Computer Science and Technology; c.Center for Computer Fundamental Education,Jilin University,Changchun 130012,China);Exchange Protocol and Implementation of Using Biometric Watermark[J];Journal of Jilin University(Information Science Edition);2010-03
6 PENG Song ( Fuling Normal Institute, Fuling 408000);A Digital Signature Scheme Based on a Combined Fast RSA Algorithm[J];Journal of Chongqing Polytechnic College;2004-02
7 NI Xiao-hong(Department of Computer Science,Cangzhou Teachers'College,Cangzhou,Hebei 061001,China);Algorithm on the Basis of Visible Color Water-marking in Wavelet Water Blind-check[J];Journal of Cangzhou Teachers' College;2011-03
8 Xu Zhengwu, Gong Yaohuan (College of Electronic Eng., UEST of China Chengdu 610054);Information Encryption Technology in Information Warfare[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;2000-05
9 Chen Yun , Gong Yaohuan (Telecommunication Institute, Electronic Engineering Institute, UEST of China Chengdu 610054);A New Montgomery Algorithm Based on Binary Redundant Representations for Modular Exponentiation with Very Large Operand[J];Journal of University of Electronic Science and Technology of China;2000-06
10 Chen Yum (Dept. of Electronic Tech. , UEST of China Chengdu 610054);A New Fast RSA Algorithm[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1995-S2
China Proceedings of conference Full-text Database 1 Hits
1 Zhuang Yan Wang Zhong (Dept.Communication Engineering,School of Electronics Information,Sichuan University,Chengdu 610065);New Cryptoraphic Algorithm for Bluetooth Security[A];[C];2003
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Ya, FENG Deng-guo (State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Science, Beijing 100039, China);Transposition Cryptosystem and the Future Expectation[J];Journal of Beijing University of Posts and Telecommunications;2003-S1
2 ZHANG Hai rong 1,HUANG Yan xin 2,FU Yan ning 2,WANG Ming de 3 (1.Dean's Office, Changchun Post and Telecommun.Inst., Changchun 130012,China; 2.Dept.of Computer Eng.,Changchun Post and Telecommun.Inst.,Changchun 130012,China; 3.Jilin Branch of;Realization method of RSA algorithm in public-key cryptosystem[J];JOURNAL OF CHANGCHUN POST AND TELECOMMUNICATION INSTITUTE;2000-02
3 YU Xiu xia (Modern Education Technology Centre,Changchun University,Changchun?130022,China);Analysis of public-key encryption numeration[J];Journal of Changchun University;2002-01
4 Chen Yun , Gong Yaohuan (Telecommunication Institute, Electronic Engineering Institute, UEST of China Chengdu 610054);A New Montgomery Algorithm Based on Binary Redundant Representations for Modular Exponentiation with Very Large Operand[J];Journal of University of Electronic Science and Technology of China;2000-06
5 CHEN Yun1,WU Zhen1,CHEN Jun1,WAN Wu-nan1,and L Yong-qi2 (1. Information Security Institute,Chengdu University of Information Technology Chengdu 610225; 2. State Key Laboratory of Modern Telecommunication Chengdu 610041 );Implementation of Equivalent Power Consumption Coding Secure Against Side Channel Attack[J];Journal of University of Electronic Science and Technology of China;2008-02
6 Chen Yum (Dept. of Electronic Tech. , UEST of China Chengdu 610054);A New Fast RSA Algorithm[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1995-S2
7 Chen Yun (Dept.of Electronic Tech.,UEST of China Chengdu 610054);An Improved Algorithm for RSA Based on Symmetry of Modulo Multiplication[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1997-05
8 Yang Yixian Lin Xiaodong Xing Yusen(Beijing Univ.of Posts and Telecomm.,Beijing 100876);Information Security Review[J];TELECOMMUNICATIONS SCIENCE;1997-12
9 NI Gu yan (College of Science, National Univ. of Defense Technology, Changsha 410073, China);A Powering Algorithm Based on Disparting Blocks[J];Journal of National University of Defense Technology;2002-05
10 JIANG Hui-ping, MAO Zhi-gang(Dept. of Electronics Science and Technology, Harbin Institute of Technology, Harbin 150001, China, );Improved RSA-CRT algorithm with prevented sidechannel information attacks[J];Journal of Harbin Institute of Technology;2004-12
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 LIU He,CHEN Yun,WU Zhen,CHEN Jun,ZHU Bing(Information Security Institute,Chengdu University of Information Technology,Chengdu 610225,China);SPA Attack on ECC Implemented on MCU[J];Journal of Chengdu University of Information Technology;2011-01
2 ZHU Bing,CHEN Yun,WU Zhen,CHEN Jun,LIU He(Information Security Institute,Chengdu University of Information Technology,Chengdu 610225,China);A Fast Algorithm of Scalar Multiplication on ECC Resistant Against SPA[J];Journal of Chengdu University of Information Technology;2011-01
3 RAO Jin-tao,CHEN Yun,WU Zhen,CHEN Jun,XU Sen(Information Security Institute,Chengdu University of Information Technology,Chengdu,610225);A Countermeasure to Simple Power Analysis for Modular Exponentiation[J];Journal of Chengdu University of Information Technology;2011-02
4 SUN Dun-can,CHEN Yun,WAN Wu-nan,SUO Wang(Information Security Institute,Chengdu University of Information Technology,Chengdu 610225,China);Approach on Hybrid Programming Technique Applied in Power Analysis Attack System[J];Journal of Chengdu University of Information Technology;2011-02
5 XU Sen,CHEN Yun,CHEN Jun,RAO Jin-tao,SUN Dun-can(Information Security Institute,Chengdu University of Information Technology,Chengdu,610225,China);A SDPA Attack Research based on Time Sequence Template in RSA[J];Journal of Chengdu University of Information Technology;2011-03
6 CAO Na-na,WAN Wu-nan,CHEN Yun,WU Zhen(Information Security Institute,Chengdu University of Information Technology,Chengdu 610225,China);Chosen-plaintext SPA Attacks Against RSA Algorithms of 8051 Chip[J];Journal of Chengdu University of Information Technology;2011-04
7 Tan Lijuan,Chen Yun (School of Communication and Information Engineering, UEST of China Chengdu 610054);Analysis and Improvement of Modular Inverse Algorithm[J];Journal of University of Electronic Science and Technology of China;2004-04
8 NI Gu yan (College of Science, National Univ. of Defense Technology, Changsha 410073, China);A Powering Algorithm Based on Disparting Blocks[J];Journal of National University of Defense Technology;2002-05
9 HUANG Shi-zeng;CHEN Yun;CHEN Jun;Applied Cragtogrphy Institute,Chengdu University of Information Technology;;SPA Attack for A Kind of Operation to Balance Point Addition and Doubling on Scalar Multiplication in Elliptic Curve[J];Journal of Chengdu University of Information Technology;2013-05
10 DU Zhi-bo, CHEN Yun, WU Zhen, CHEN Jun, ZHOU Li-sha (Information Security Institute, Chengdu University of Information Technology, Chengdu 610225);Implementation Algorithm of Pseudo Modular Inversion Secure Against Side Channel Attack[J];Computer Engineering;2010-03
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Chen Yum (Dept. of Electronic Tech. , UEST of China Chengdu 610054);A New Fast RSA Algorithm[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1995-S2
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved