Primes, Semi-Primes, and Strong Composites

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fast Generation of Random, Strong Rsa Primes

A number of cryptographic standards currently under development call for the use of strong primes in the generation of an RSA key. This paper suggests a fast way of generating random strong primes that also satisfy a number of other cryptographic requirements. The method requires no more time to generate strong primes than it takes to generate random primes.

متن کامل

Are 'Strong' Primes Needed for RSA

We review the arguments in favor of using so called strong primes in the RSA public key cryptosystem There are two types of such arguments those that say that strong primes are needed to protect against factoring attacks and those that say that strong primes are needed to protect against cycling attacks based on repeated encryption We argue that contrary to common belief it is unnecessary to us...

متن کامل

Catalan Numbers, Primes and Twin Primes

with C0 = 1. Their appearances occur in a dazzling variety of combinatorial settings where they are used to enumerate all manner of geometric and algebraic objects (see Richard Stanley’s collection [28, Chap. 6]; an online Addendum is continuously updated). Quite a lot is known about the divisibility of the Catalan numbers; see [2, 10]. They are obviously closely related to the middle binomial ...

متن کامل

Small Gaps between Primes or Almost Primes

Let pn denote the nth prime. Goldston, Pintz, and Yıldırım recently proved that lim inf n→∞ (pn+1 − pn) log pn = 0. We give an alternative proof of this result. We also prove some corresponding results for numbers with two prime factors. Let qn denote the nth number that is a product of exactly two distinct primes. We prove that lim inf n→∞ (qn+1 − qn) ≤ 26. If an appropriate generalization of ...

متن کامل

Interrelation Among RSA Security, Strong Primes, and Factoring

The security of RSA depends critically on the inability of an adversary to compute private key from the public key. The problem of computing private key from public key is equivalent to the problem of factoring n into its prime factors. Therefore it is important for the RSA user to select prime numbers in such a way that the problem of factoring n is computationally infeasible for an adversary....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Missouri Journal of Mathematical Sciences

سال: 1990

ISSN: 0899-6180

DOI: 10.35834/1990/0201004