期刊文献+
共找到136篇文章
< 1 2 7 >
每页显示 20 50 100
A GENERAL IN-PLACE AND IN-ORDER PRIME FACTOR FFT ALGORITHM
1
作者 王中德 《Journal of Electronics(China)》 1991年第1期60-67,共8页
Starting from an index mapping for one to multi-dimensions, a general in-placeand in-order prime factor FFT algorithm is proposed in this paper. In comparing with existingprime factor FFT algorithms, this algorithm sa... Starting from an index mapping for one to multi-dimensions, a general in-placeand in-order prime factor FFT algorithm is proposed in this paper. In comparing with existingprime factor FFT algorithms, this algorithm saves about half of the required storage capacityand possesses a higher efficiency. In addition, this algorithm can easily implement the DFT andIDFT in a single subroutine, 展开更多
关键词 Fast algorithm DISCRETE FOURIER TRANSFORM FFT prime factor algorithm
在线阅读 下载PDF
Prime Box Parallel Search Algorithm: Searching Dynamic Dictionary in O(lg m) Time
2
作者 Amit Pandey Berhane Wolde-Gabriel Elias Jarso 《Journal of Computer and Communications》 2016年第4期134-145,共12页
Hashing and Trie tree data structures are among the preeminent data mining techniques considered for the ideal search. Hashing techniques have the amortized time complexity of O(1). Although in worst case, searching a... Hashing and Trie tree data structures are among the preeminent data mining techniques considered for the ideal search. Hashing techniques have the amortized time complexity of O(1). Although in worst case, searching a hash table can take as much as θ(n) time [1]. On the other hand, Trie tree data structure is also well renowned data structure. The ideal lookup time for searching a string of length m in database of n strings using Trie data structure is O(m) [2]. In the present study, we have proposed a novel Prime Box parallel search algorithm for searching a string of length m in a dictionary of dynamically increasing size, with a worst case search time complexity of O(log2m). We have exploited parallel techniques over this novel algorithm to achieve this search time complexity. Also this prime Box search is independent of the total words present in the dictionary, which makes it more suitable for dynamic dictionaries with increasing size. 展开更多
关键词 prime Box Search algorithm Information Retrieval Lexicographical Search Dynamic Dictionary Search Parallel Search
在线阅读 下载PDF
一种基于Prime算法的SDQKD网络路由方案
3
作者 张思楚 冯雁 +1 位作者 谢四江 陈金翔 《计算机应用与软件》 北大核心 2025年第12期131-138,171,共9页
为解决当前QKD网络密钥量不足、链路状态信息更新不及时等导致的网络性能不佳问题,提出一种基于Prime算法的SDQKD网络路由方案。方案采用偏离思想,提出一种基于Prime的多路径算法,将链路剩余密钥量作为权重得出K条路径;再基于可用密钥... 为解决当前QKD网络密钥量不足、链路状态信息更新不及时等导致的网络性能不佳问题,提出一种基于Prime算法的SDQKD网络路由方案。方案采用偏离思想,提出一种基于Prime的多路径算法,将链路剩余密钥量作为权重得出K条路径;再基于可用密钥生成率和中继跳数从K条路径中求出最优路径,实现路由时选择可用密钥量相对较大的路径,还综合考虑了中继跳数和可用密钥生成率。方案还针对SDQKD网络上报链路状态信息不及时或占用资源过多的问题,提出基于剩余密钥量变化幅度的启发式按需上报链路状态信息机制。实验仿真结果表明该方案在两个不同拓扑大量级数据下分别提高了密钥分发成功率9.6百分点~14.8百分点和7百分点~14百分点,还实现了根据请求强度按需上报链路状态信息。 展开更多
关键词 量子密钥分发 多路径 prime算法 软件定义网络 链路状态
在线阅读 下载PDF
PRIME标准中安全配置的研究
4
作者 金明 戴崇 +1 位作者 黄均安 唐振 《佳木斯大学学报(自然科学版)》 CAS 2012年第6期872-875,879,共5页
通过多方面介绍和分析PRIME标准中的安全配置机制,给出了此安全配置机制在具体使用中的实现.最后,对安全配置在电力通讯中的应用前景进行展望.
关键词 电力线通信技术 prime标准 安全配置 AES算法 密钥
在线阅读 下载PDF
Development of New Method for Generating Prime Numbers
5
作者 Seidikassym Baibekov Serik Altynbek 《Natural Science》 2015年第8期416-423,共8页
The article is devoted to actual problems of prime numbers. A theorem that allows generating a sequence of prime numbers is proposed. An algorithm for generating prime numbers has been developed. A comparison of the p... The article is devoted to actual problems of prime numbers. A theorem that allows generating a sequence of prime numbers is proposed. An algorithm for generating prime numbers has been developed. A comparison of the proposed theorem, with Wilson’s theorem is also provided. 展开更多
关键词 prime NUMBERS THEOREM algorithm Method prime TWINS Generation
在线阅读 下载PDF
New Finding on Factoring Prime Power RSA Modulus N = p^rq
6
作者 Sadiq SHEHU Muhammad Rezal Kamel ARIFFIN 《Journal of Mathematical Research with Applications》 CSCD 2017年第4期404-418,共15页
This paper proposes three new attacks. In the first attack we consider the class of the public exponents satisfying an equation e X-N Y +(ap^r+ bq^r)Y = Z for suitably small positive integers a, b. Applying contin... This paper proposes three new attacks. In the first attack we consider the class of the public exponents satisfying an equation e X-N Y +(ap^r+ bq^r)Y = Z for suitably small positive integers a, b. Applying continued fractions we show thatY/Xcan be recovered among the convergents of the continued fraction expansion of e/N. Moreover, we show that the number of such exponents is at least N^(2/(r+1)-ε)where ε≥ 0 is arbitrarily small for large N. The second and third attacks works upon k RSA public keys(N_i, e_i) when there exist k relations of the form e_ix-N_iy_i +(ap_i^r + bq_i^r )y_i = z_i or of the form e_ix_i-N_iy +(ap_i^r + bq_i^r )y = z_i and the parameters x, x_i, y, y_i, z_i are suitably small in terms of the prime factors of the moduli. We apply the LLL algorithm, and show that our strategy enables us to simultaneously factor k prime power RSA moduli. 展开更多
关键词 RSA prime power factorization LLL algorithm simultaneous diophantine approximations continued fraction
原文传递
There Are Infinitely Many Mersnne Composite Numbers with Prime Exponents
7
作者 Fengsui Liu 《Advances in Pure Mathematics》 2018年第7期687-698,共12页
By extending both arithmetical operations into finite sets of natural numbers, from the entire set of natural numbers successively deleting some residue classes modulo a prime, we invented a recursive sieve method or ... By extending both arithmetical operations into finite sets of natural numbers, from the entire set of natural numbers successively deleting some residue classes modulo a prime, we invented a recursive sieve method or algorithm on natural numbers and their sets. The algorithm mechanically yields a sequence of sets, which converges to the set of all primes p such that 2p + 1 divides the Mersenne number Mp. The cardinal sequence corresponding to the sequence of sets is strictly increasing. So that we have captured enough usable structures, without any estimation, the existing theories of those structures allow us to prove an exact result: there are infinitely many Mersenne composite numbers with prime exponents Mp. 展开更多
关键词 Mersenne Composite NUMBERS Sophie German primeS Recursive algorithm Order Topology Limit of Sequence of Sets
在线阅读 下载PDF
Representation of an Integer by a Quadratic Form through the Cornacchia Algorithm
8
作者 Moumouni Djassibo Woba 《Applied Mathematics》 2024年第9期614-629,共16页
Cornachia’s algorithm can be adapted to the case of the equation x2+dy2=nand even to the case of ax2+bxy+cy2=n. For the sake of completeness, we have given modalities without proofs (the proof in the case of the equa... Cornachia’s algorithm can be adapted to the case of the equation x2+dy2=nand even to the case of ax2+bxy+cy2=n. For the sake of completeness, we have given modalities without proofs (the proof in the case of the equation x2+y2=n). Starting from a quadratic form with two variables f(x,y)=ax2+bxy+cy2and n an integer. We have shown that a primitive positive solution (u,v)of the equation f(x,y)=nis admissible if it is obtained in the following way: we take α modulo n such that f(α,1)≡0modn, u is the first of the remainders of Euclid’s algorithm associated with n and α that is less than 4cn/| D |) (possibly α itself) and the equation f(x,y)=n. has an integer solution u in y. At the end of our work, it also appears that the Cornacchia algorithm is good for the form n=ax2+bxy+cy2if all the primitive positive integer solutions of the equation f(x,y)=nare admissible, i.e. computable by the algorithmic process. 展开更多
关键词 Quadratic Form Cornacchia algorithm Associated Polynomials Euclid’s algorithm prime Number
在线阅读 下载PDF
Integer Factorization of Semi-Primes Based on Analysis of a Sequence of Modular Elliptic Equations
9
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第10期609-615,共7页
In this paper is demonstrated a method for reduction of integer factorization problem to an analysis of a sequence of modular elliptic equations. As a result, the paper provides a non-deterministic algorithm that comp... In this paper is demonstrated a method for reduction of integer factorization problem to an analysis of a sequence of modular elliptic equations. As a result, the paper provides a non-deterministic algorithm that computes a factor of a semi-prime integer n=pq, where prime factors p and q are unknown. The proposed algorithm is based on counting points on a sequence of at least four elliptic curves y2=x(x2+b2)(modn) , where b is a control parameter. Although in the worst case, for some n the number of required values of parameter b that must be considered (the number of basic steps of the algorithm) substantially exceeds four, hundreds of computer experiments indicate that the average number of the basic steps does not exceed six. These experiments also confirm all important facts discussed in this paper. 展开更多
关键词 Integer FACTORIZATION FACTORIZATION of Semi-primes Non-Deterministic algorithm ELLIPTIC CURVES Counting Points on ELLIPTIC CURVES Crypto-Immunity Dual ELLIPTIC CURVES
在线阅读 下载PDF
Infinite Number of Twin Primes
10
作者 S. N. Baibekov A. A. Durmagambetov 《Advances in Pure Mathematics》 2016年第13期954-971,共18页
This work is devoted to the theory of prime numbers. Firstly it introduced the concept of matrix primes, which can help to generate a sequence of prime numbers. Then it proposed a number of theorems, which together wi... This work is devoted to the theory of prime numbers. Firstly it introduced the concept of matrix primes, which can help to generate a sequence of prime numbers. Then it proposed a number of theorems, which together with theorem of Dirichlet, Siegel and Euler allow to prove the infinity of twin primes. 展开更多
关键词 prime Numbers Twin primes Composite Numbers Natural Numbers algorithmS Arithmetic Progression prime Numbers Matrix Special Factorial Generation of prime Numbers
在线阅读 下载PDF
Applying Evolutionary Algorithm to Public Key Cryptosystems
11
作者 Tu Hang, Li Li, Wu Tao-jun, Li Yuan-xiangState Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Hubei,China)School of Computer, Wuhan University, Wuhan 430072, Hubei,China 《Wuhan University Journal of Natural Sciences》 CAS 2003年第S1期287-293,共7页
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under diffe... A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too. 展开更多
关键词 prime generation RSA public key cryptography evolutionary algorithm
在线阅读 下载PDF
STORE AND GENERATION OF LARGE-SCALE PRIME LIST ON THE COMPUTER
12
作者 林应举 《Numerical Mathematics A Journal of Chinese Universities(English Series)》 SCIE 2004年第2期166-171,共6页
A scheme of very compact store for large-scale prime list is given and two algorithms for rapid generating the list are provided.
关键词 大型素数表 筛选法 紧存储 生成算法 计算机
在线阅读 下载PDF
Collatz Conjecture Redefinition on Prime Numbers
13
作者 Ramon Carbó-Dorca 《Journal of Applied Mathematics and Physics》 2023年第1期147-157,共11页
The definition of Collatz Operator, the mathematical avatar of the Collatz Algorithm, permits the transformation of the Collatz conjecture, which is delineated over the whole natural number set, into an equivalent inf... The definition of Collatz Operator, the mathematical avatar of the Collatz Algorithm, permits the transformation of the Collatz conjecture, which is delineated over the whole natural number set, into an equivalent inference restricted to the odd prime number set only. Based on this redefinition, one can describe an empirical-heuristic proof of the Collatz conjecture. 展开更多
关键词 Natural Numbers prime Numbers Pseudospaces Collatz Conjecture Collatz algorithm Collatz Operator Collatz Compliance Syracuse algorithm
在线阅读 下载PDF
基于Python的大素数生成方法原理分析与实现
14
作者 黄绍龙 《计算机应用文摘》 2025年第15期218-220,共3页
文章介绍了Miller-Rabin素性检测算法的原理,并基于Python语言实现了大素数的生成。对于随机生成的指定位数大整数,先采用小素数进行初步筛选,未被筛除的数再通过Miller-Rabin素性检测算法进行进一步判定。该方法在生成大素数方面具有... 文章介绍了Miller-Rabin素性检测算法的原理,并基于Python语言实现了大素数的生成。对于随机生成的指定位数大整数,先采用小素数进行初步筛选,未被筛除的数再通过Miller-Rabin素性检测算法进行进一步判定。该方法在生成大素数方面具有较高的效率。 展开更多
关键词 大素数 费马小定理 概率算法 随机化算法 Miller-Rabin素性检测
在线阅读 下载PDF
基于改进RSA算法的计算机网络数据安全共享方法 被引量:1
15
作者 李秋月 方加娟 《工业控制计算机》 2025年第10期108-110,共3页
在计算机网络数据共享中,数据加密机制密钥管理不善,导致共享数据的各个属性未被优化处理,进而造成数据在传输与存储过程中易被非法截获或篡改,网络数据隐私保护度较低。为此,提出基于改进RSA算法的计算机网络数据安全共享方法。该方法... 在计算机网络数据共享中,数据加密机制密钥管理不善,导致共享数据的各个属性未被优化处理,进而造成数据在传输与存储过程中易被非法截获或篡改,网络数据隐私保护度较低。为此,提出基于改进RSA算法的计算机网络数据安全共享方法。该方法基于传统RSA加密算法,引入更多素数因子,从而增加密钥生成的复杂性,进一步增强数据的安全性。该策略将复杂的解密任务细化为针对最小属性集中每一个属性的独立处理单元,以此简化单个解密任务的复杂度。最后借助Spark平台强大的分布式计算能力,使得多个解密任务能够并行地在集群中的不同节点上执行。将各节点上的解密结果收集并合并,以恢复出完整的明文信息,实现数据安全共享。 展开更多
关键词 改进RSA算法 安全共享 素数因子 双重增强型RSA算法 同态加密
在线阅读 下载PDF
Weil对和Tate对在群结构查找新方法上的实施
16
作者 胡建军 《吉林大学学报(信息科学版)》 2025年第1期156-165,共10页
针对Tate对的计算效率优于Weil对问题仍然存疑,有待进一步验证,以及Miller提出的二元群结构参数选择算法属于概率型算法,算法效率不高的问题,建立了Tate对和Weil对执行效率的分析模型,提出一种利用椭圆曲线的阶是扭曲值的平方关系查找... 针对Tate对的计算效率优于Weil对问题仍然存疑,有待进一步验证,以及Miller提出的二元群结构参数选择算法属于概率型算法,算法效率不高的问题,建立了Tate对和Weil对执行效率的分析模型,提出一种利用椭圆曲线的阶是扭曲值的平方关系查找扭曲值参数的新方法。研究表明,在扭曲值较小时,Tate对的计算效率优于Weil对,与已有研究结果一致,但当扭曲值很大时,Weil对的计算效率优于Tate对,同时扭曲值参数查找新方法的时间复杂度小于Miller方法的时间复杂度O(M),相对Miller的概率方法,新方法为确定型方法。分析和实例验证了分析模型的正确性,而且新方法极大地提高了参数选择的效率和准确性。 展开更多
关键词 WEIL对 Tate对 Miller算法 素数有限域 离散对数
在线阅读 下载PDF
Python程序设计基础课程“一题多解”培养算法思维的教学探索
17
作者 肖泽青 《计算机教育》 2025年第10期276-281,共6页
提出在教学过程中采用“一题多解”培养学生算法思维的主要思路和措施,以Python程序设计基础课程为例,详细阐述“一题多解”在经典实例“寻找水仙花数”“判断一个数是否为素数”及推广到验证哥德巴赫猜想中的教学实践,为Python程序设... 提出在教学过程中采用“一题多解”培养学生算法思维的主要思路和措施,以Python程序设计基础课程为例,详细阐述“一题多解”在经典实例“寻找水仙花数”“判断一个数是否为素数”及推广到验证哥德巴赫猜想中的教学实践,为Python程序设计基础课程的教学提供参考。 展开更多
关键词 Python程序设计基础 一题多解 算法思维 水仙花数 素数 哥德巴赫猜想
在线阅读 下载PDF
Miller-Rabin算法研究与优化实现 被引量:9
18
作者 秦晓东 辛运帏 卢桂章 《计算机工程》 CAS CSCD 北大核心 2002年第10期55-57,共3页
Miller-Rabin算法是目前主流的基于概率的素数测试算法,在构建密码安全体系中占有重要的地位。通过比较各种素数测试算法和对Miller-Rabin算法进行的仔细研究,证明在计算机中构建密码安全体系时,Miller-Rain算法是完成素数测试的最... Miller-Rabin算法是目前主流的基于概率的素数测试算法,在构建密码安全体系中占有重要的地位。通过比较各种素数测试算法和对Miller-Rabin算法进行的仔细研究,证明在计算机中构建密码安全体系时,Miller-Rain算法是完成素数测试的最佳选择。通过对Miller-Rabin算法底层运算的优化,可以取得较以往实现更好的性能。 展开更多
关键词 Miller-Rabin算法 优化 素数 时间复杂度 误判概率 密码学 信息安全 计算机
在线阅读 下载PDF
RSA数据加密算法的分析与改进 被引量:26
19
作者 石井 吴哲 +2 位作者 谭璐 王昊鹏 王娜 《济南大学学报(自然科学版)》 CAS 北大核心 2013年第3期283-286,共4页
在RSA加密算法中,大素数寻找算法需要大量的计算,从而降低了RSA的效率。为此,笔者首先使用小素数筛值法、偶数排除法和小素数整除法进行伪素数的初步排除,再使用Miller-Rabin算法对伪素数的素性进行检测,以提高素数的检测效率。测试结... 在RSA加密算法中,大素数寻找算法需要大量的计算,从而降低了RSA的效率。为此,笔者首先使用小素数筛值法、偶数排除法和小素数整除法进行伪素数的初步排除,再使用Miller-Rabin算法对伪素数的素性进行检测,以提高素数的检测效率。测试结果表明:改进算法与经典Miller-Rabin算法相比,其生成大素数的时间减少,且所得到的数不是大素数的概率小于0.1%。从而提高了RSA加密算法的效率,增强了RSA加密算法的适用性。 展开更多
关键词 加密算法 RSA算法 大素数生成算法 算法效率
在线阅读 下载PDF
二进制补丁比对中的指令归一化算法 被引量:3
20
作者 沈亚楠 赵荣彩 +4 位作者 王小芹 任华 刘振华 张新宇 李鹏飞 《计算机工程》 CAS CSCD 北大核心 2010年第15期46-48,共3页
针对软件二进制补丁分析过程,提出一种指令归一化算法,用于判别补丁前后的相应基本块内指令是否发生重排序。与常用的小素数法相比,该算法不受基本块内指令条数的限制,不会导致差异信息漏报,且效率较高、效果良好。初步实验证明,该算法... 针对软件二进制补丁分析过程,提出一种指令归一化算法,用于判别补丁前后的相应基本块内指令是否发生重排序。与常用的小素数法相比,该算法不受基本块内指令条数的限制,不会导致差异信息漏报,且效率较高、效果良好。初步实验证明,该算法减少了人工分析差异信息的工作量,可以帮助逆向分析人员快速定位软件差异。 展开更多
关键词 软件补丁比对 指令重排列 小素数法 指令归一化
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部