Implementation issues

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter we examine how one actually implements cryptographic operations. We shall mainly be concerned with public key operations since those are the most complex to implement. For example, when we introduce RSA or DSA later we will have to perform a modular exponentiation with respect to a modulus of a thousand or more bits. This means we need to understand the implementation issues involved with both modular arithmetic and exponentiation algorithms.

Cite

CITATION STYLE

APA

Smart, N. P. (2016). Implementation issues. In Information Security and Cryptography (Vol. 0, pp. 95–115). Springer International Publishing. https://doi.org/10.1007/978-3-319-21936-3_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free