Browse > Article
http://dx.doi.org/10.7465/jkdi.2014.25.6.1467

Computer intensive method for extended Euclidean algorithm  

Kim, Daehak (Department of Mathematics, Catholic University of Daegu)
Oh, Kwang Sik (Department of Mathematics Education, Catholic University of Daegu)
Publication Information
Journal of the Korean Data and Information Science Society / v.25, no.6, 2014 , pp. 1467-1474 More about this Journal
Abstract
In this paper, we consider the two computer intensive methods for extended Euclidean algdrithm. Two methods we propose are C-programming based approach and Microsoft excel based method, respectively. Thses methods are applied to the derivation of greatest commnon devisor, multiplicative inverse for modular operation and the solution of diophantine equation. Concrete investigation for extended Euclidean algorithm with the computer intensive process is given. For the application of extended Euclidean algorithm, we consider the RSA encrytion method which is still popular recently.
Keywords
Computer intensive method; extende Euclidean algorithm; greatest common devisor; modular operation; multiplicative inverse;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Dixon, J. (1970). The number of steps in the Euclidean algorithm. Journal of Number Theory, 2, 414-422.   DOI
2 Choi, H. S. and Ha, J. (2011). Development of process-oriented education tool for Statistics with Excel Macro. Journal of the Korean Data & Information Science Society, 22, 643-650.   과학기술학회마을
3 Choi, H. S. and Ha, J. (2012). Development of Bayes' rule education tool with Excel Macro. Journal of the Korean Data & Information Science Society, 23, 905-912.   과학기술학회마을   DOI   ScienceOn
4 Choi, H. S. and Kim, T. Y. (2010). A study on sampling using the function of excel. Journal of the Korean Data & Information Science Society, 21, 481-491.   과학기술학회마을
5 Kim, D. (2012). On the development of DES round key generator based on Excel Macro. Journal of the Korean Data & Information Science Society, 23, 1203-1212.   과학기술학회마을   DOI   ScienceOn
6 Knuth, D. E. (1998). The art of computer programming, volume 2: Seminumerical algorithms, Addison-Wesley Professional, Boston, MA.
7 Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126.   DOI   ScienceOn