A Note on the Computation of the Modular Inverse for Cryptography

In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that require multiple computations of modulo multiplicative inverses. In this paper, we describe the modulo operation and we recollect the main approaches to computing the modulus. Then, given <i>a</i&g...

Full description

Bibliographic Details
Main Authors: Michele Bufalo, Daniele Bufalo, Giuseppe Orlando
Format: Article
Language:English
Published: MDPI AG 2021-06-01
Series:Axioms
Subjects:
Online Access:https://www.mdpi.com/2075-1680/10/2/116

Similar Items