1 |
Maurer, U. M., "Fast generation of prime numbers and secure public-key cryptographic parameters," Journal of Cryptology, Vol.8. No.3. pp.123-155. 1995. DOI: 10.1007/BF00202269
DOI
|
2 |
Heejin Park and Dongkyu Kim, "Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation," IEICE TRANSACTIONS on Information and Systems, Vol.E94-D. No.6. pp.1210-1215. 2011. DOI: 10.1587/transinf.E94
DOI
|
3 |
Changgi Kim, Hosung Jo, Heejin Park "Probabilistic Analysis of Prime and Safe-prime Generation with Division Table," The Journal of Korean Institute of Next Generation Computing, Vol.12, Issue6, pp.82-91, 2016.
|
4 |
Hosung Jo, Heejin Park, "Probabilistic Analysis of Incremental Random Number Generation using Division Tables," 2013 Fall Korea Software Congress, pp.1330-1332, 2013.
|
5 |
Cormen T. H., Leiserson C. E. and Rivest R. L. and Stein, C., Introduction to Algorithms, 3rd ed, MIT press. 2009.
|
6 |
Changhun Jung, Daehong Min, DaeHun Nyang and KyungHee Lee, "A Proposal of One-Time Password Authentication Protocol using DigitalSeal," The Journal of Korean Institute of Next Generation Computing, Vol.14, No.4, pp.45-57, 2018.
|
7 |
Jin Bok Kim, Tae Youn Han and Mun-Kyu Lee, "Authentication of smart phone users based on composite stage information," The Journal of Korean Institute of Next Generation Computing, Vol.7, No.5, pp.4-12, 2011.
|
8 |
Rivest, R. L. and Shamir, A. and Adleman, L., "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978. DOI: 10.1145/359340.359342
DOI
|
9 |
ElGamal, T., "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Transactions on information Theory, Vol. IT-31, No.4, pp.469-472, 1985. DOI: 10.1007/3-540-39568-7_2
DOI
|
10 |
Stallings, W., Cryptography and Network Security Principles and Practices, 4th ed, Prentice Hall. 2005.
|
11 |
Miller, G. L., "Riemann's Hypothesis and Tests for Primality," Journal of Computer Systems Science, Vol.13. No.3. pp.300-317. 1976. DOI: 10.1016/S0022-0000(76)80043-8
DOI
|
12 |
Menezes, A. J. and van Oorschot, P. C. and Vanstone, S. A., Handbook of Applied Cryptography, CRC Press. 1996.
|