Abstract
This paper describes a method for computing a modular exponentiation, useful in performing the RSA Public Key algorithm, suitable for software or hardware implementation. The method uses conventional multiplication, followed by partial modular reduction based on sums of residues. We show that for a simple recursive system where the output of partial modular reduction is the input for the next multiplication, overflow presents few problems.
Cite
CITATION STYLE
Findlay, P. A., & Johnson, B. A. (1990). Modular exponentiation using recursive sums of residues. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 435 LNCS, pp. 371–386). Springer Verlag. https://doi.org/10.1007/0-387-34805-0_35
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.