2020
DOI: 10.1007/s13389-020-00231-w
|View full text |Cite
|
Sign up to set email alerts
|

Residue arithmetic systems in cryptography: a survey on modern security applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 60 publications
0
10
0
Order By: Relevance
“…The Residue Number System (RNS) has been widely applied to efficient carry-free arithmetic operations in classical computers without the carry propagation problem [28][29][30]. RNS-based arithmetic modulo 2 n − 1 computation is one of the most common RNS operations that is used in pseudorandom number generation and various cryptographic algorithms [31,32]. The basic idea for modulo 2 n − 1 operation is to use the constant value −(2 n − 1) to be added by the sum of two numbers A and B, where the two inputs A and B are to be in the range {0, 2 n − 2}.…”
Section: Residue Number Systemmentioning
confidence: 99%
“…The Residue Number System (RNS) has been widely applied to efficient carry-free arithmetic operations in classical computers without the carry propagation problem [28][29][30]. RNS-based arithmetic modulo 2 n − 1 computation is one of the most common RNS operations that is used in pseudorandom number generation and various cryptographic algorithms [31,32]. The basic idea for modulo 2 n − 1 operation is to use the constant value −(2 n − 1) to be added by the sum of two numbers A and B, where the two inputs A and B are to be in the range {0, 2 n − 2}.…”
Section: Residue Number Systemmentioning
confidence: 99%
“…The three main areas of application are signal processing [9], [10], [11], cryptography but also in theoretical computer science to reach complexity bounds [12], [13]. The work in this paper is relevant for all applications on large numbers including cryptography since the 90's [14] with RSA, DH, ECC [15], [16], pairing [17], Euclidean lattices, homomorphic protocols [18], [19], etc.…”
Section: Introductionmentioning
confidence: 99%
“…We aim to directly generate randomly distributed integers with the desired precision using the PWLCM. The proposed algorithm combines chaos, modular arithmetic, and lattice-based cryptography [3,8,35]. The latter allows to easily extend the external key length without duplication.…”
Section: Introductionmentioning
confidence: 99%