Fast prime number generation algorithms on smart mobile devices
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jo, Hosung | - |
dc.contributor.author | Park, Heejin | - |
dc.date.accessioned | 2022-07-13T12:02:23Z | - |
dc.date.available | 2022-07-13T12:02:23Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2017-09 | - |
dc.identifier.issn | 1386-7857 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/151698 | - |
dc.description.abstract | As smart mobile devices are widely used, mobile threats are more serious, so security in mobile becomes more and more important. However, the performance of these devices are not powerful enough to use the same security algorithms as PCs. Public key cryptosystems such as RSA need big primes to enhance the security, however, generating a big prime takes substantial time even on a PC. In this paper, we study two prime generation algorithms for smart mobile devices. First, we analyze a previous prime generation algorithm using a GCD test, named PGCD-MR, and show it sometimes performs inferior to the traditional TD-MR test. Second, we propose a new GCD test, named m-bit GCD-MR, for fast prime generation in both PCs and smart mobile devices. We compare the running times of PGCD-MR, m-bit GCD-MR, and TD-MR combinations on PCs and Samsung Galaxy Tab 10.1. The experimental results show our running time analysis is accurate (only 2% error) and m-bit GCD-MR test is the fastest among three prime generation algorithms. More exactly, m-bit GCD-MR test is about 20% faster than the TD-MR combination. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Fast prime number generation algorithms on smart mobile devices | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Heejin | - |
dc.identifier.doi | 10.1007/s10586-017-0992-3 | - |
dc.identifier.scopusid | 2-s2.0-85021146181 | - |
dc.identifier.wosid | 000407928800022 | - |
dc.identifier.bibliographicCitation | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, v.20, no.3, pp.2167 - 2175 | - |
dc.relation.isPartOf | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | - |
dc.citation.title | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | - |
dc.citation.volume | 20 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 2167 | - |
dc.citation.endPage | 2175 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | MANAGEMENT-SYSTEM | - |
dc.subject.keywordPlus | PRIMALITY | - |
dc.subject.keywordAuthor | Prime generation | - |
dc.subject.keywordAuthor | Primality test | - |
dc.subject.keywordAuthor | RSA | - |
dc.subject.keywordAuthor | Public-key cryptosystems | - |
dc.subject.keywordAuthor | GCD | - |
dc.identifier.url | https://link.springer.com/article/10.1007/s10586-017-0992-3 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.