A Note on the Computation of the Modular Inverse for Cryptography
In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that require multiple computations of modulo multiplicative inverses. In this paper, we describe the modulo operation and we recollect the main approaches to computing the modulus. Then, given <i>a</i&g...
Main Authors: | Michele Bufalo, Daniele Bufalo, Giuseppe Orlando |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-06-01
|
Series: | Axioms |
Subjects: | |
Online Access: | https://www.mdpi.com/2075-1680/10/2/116 |
Similar Items
-
Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
by: Michele Bufalo, et al.
Published: (2023-03-01) -
Low latency high throughput Montgomery modular multiplier for RSA cryptosystem
by: Aashish Parihar, et al.
Published: (2022-06-01) -
Application of Extended Euclid Algorithm on Hill Cipher Cryptography Modulo 95
by: Annisa, et al.
Published: (2023-07-01) -
Efficient Algorithm for Multi-Bit Montgomery Inverse Using Refined Multiplicative Inverse Modular <inline-formula> <tex-math notation="LaTeX">$2^K$ </tex-math></inline-formula>
by: Young-Sik Kim
Published: (2019-01-01) -
Secure framework for IoT technology based on RSA and DNA cryptography
by: Mona M. Elamir, et al.
Published: (2022-08-01)