Prime generation with the Demytko–Miller–Trbovich algorithm

0Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Prime numbers satisying certain constraints are used in publickey cryptosystems. Consequently, some attention has been paid to algorithms which allow large, cryptographically useful, primes to be created. One algorithm, devised by Miller and Trbovich, was neglected until Nick Demytko of Telecom Research Laboratories published a theoretical examination of it in 1988. At Telecom's invitation the following practical analysis of the method was undertaken. An implementation of the algorithm was written, and nearly one million primes generated, and analysed. This paper gives details of the algorithm, implementation, experiments and results, and draws conclusions about the applicability of the algorithm.

Cite

CITATION STYLE

APA

Condie, L. (1993). Prime generation with the Demytko–Miller–Trbovich algorithm. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 718 LNCS, pp. 413–421). Springer Verlag. https://doi.org/10.1007/3-540-57220-1_79

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free