Journal of Computer Applications ›› 2015, Vol. 35 ›› Issue (6): 1673-1677.DOI: 10.11772/j.issn.1001-9081.2015.06.1673
Previous Articles Next Articles
WANG Guangsai1,2, ZENG Guang1,2, HAN Wenbao1,2, LI Yongguang1,2
Received:
2015-01-05
Revised:
2015-03-29
Published:
2015-06-12
通讯作者:
王广赛(1990-),男,河南鹿邑人,硕士研究生,CCF会员,主要研究方向:公钥密码;sswang1990@yeah.net
作者简介:
曾光(1980-),男,吉林吉林人,副教授,博士,主要研究方向:网络密码;韩文报(1963-),男,河北邯郸人,教授,博士生导师,主要研究方向:密码理论、网络安全;李永光(1988-),男,河南淮阳人,硕士研究生,主要研究方向:分组密码。
基金资助:
国家自然科学基金资助项目(61003291);数学工程与先进计算国家重点实验室开放课题基金资助项目(2013A03,2013A10)。
CLC Number:
WANG Guangsai, ZENG Guang, HAN Wenbao, LI Yongguang. Fast greatest common divisor algorithm based on k-ary reduction[J]. Journal of Computer Applications, 2015, 35(6): 1673-1677.
王广赛, 曾光, 韩文报, 李永光. 基于k-ary消减的快速最大公约数算法[J]. 计算机应用, 2015, 35(6): 1673-1677.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2015.06.1673
[1] BUCHBERGER B, JEBELEAN T. Parallel rational arithmetic for computer algebra systems: motivating experiments [M]. Vienna: ACPC-Austrian Center for Parallel Computation, 1993: 1-3.查不到该文献, 作者确认是否有误。书名[M].出版地:出版社, 出版年:引用页码。 [2] LIOYD E K. The art of computer programming, vol. 2, seminumerical algorithms[J]. Software: Practice and Experience, 1982, 12(9): 883-884. [3] STEIN J. Computational problems associated with Racah algebra [J]. Journal of Computational Physics, 1967, 1(3): 397-405. [4] BRENT R P, KUNG H T. Systolic VLSI arrays for polynomial GCD computation [J]. IEEE Transactions on Computers, 1984, C-33 (8): 731-736. [5] YAP C K. Fundamental problems in algorithmic algebra [M]. Oxford: Oxford University Press, 核实是2000版还是1999-2000: 43-76. [6] STEHLÉ D, ZIMMERMANN P. A binary recursive gcd algorithm [C]//Proceedings of the 2004 6th International Symposium on Algorithmic Number Theory , LNCS 3076. Berlin: Springer, 2004: 411-425. [7] SORENSON J. Two fast GCD algorithms [J]. Journal of Algorithms, 1994, 16(1): 110-144. [8] JEBELEAN T. A generalization of the binary GCD algorithm [C]//Proceedings of the 1993 International Symposium on Symbolic and Algebraic Computation. New York: ACM, 1993: 111-116. [9] WEBER K.The accelerated integer GCD algorithm [J]. ACM Transactions on Mathematical Software, 1995, 21(1): 111-122. [10] SEDJELMACI S M. The mixed binary Euclid algorithm [J]. Electronic Notes in Discrete Mathematics, 2009, 35查过, 无期: 169-176. [11] MOHAMED F K. A novel fast hybrid GCD computation algorithm [J]. International Journal of Computing Science and Mathematics, 2014, 5(1): 37-47. [12] COHN H. Advanced number theory [M]. New York: Courier Dover Publications, 网上是19802012: 55-56. [13] SCHÖNHAGE A, STRASSEN V. Schnelle multiplikation grosser zahlen [J]. Computing, 1971, 查不到卷期, 核实卷期7(3/4): 281-292. [14] BRENT R P. Analysis of the binary Euclidean algorithm [EB/OL]. [2014-12-02]. http://maths-people.anu.edu.au/~brent/pd/rpb037a.pdf. Pittsburgh: Department of Computer Science, Carnegie-Mellon University, 1976: 321-355. |
[1] | Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI. Three-factor anonymous authentication and key agreement protocol [J]. Journal of Computer Applications, 2021, 41(11): 3281-3287. |
[2] | Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU. Digital rights management scheme based on secret sharing in blockchain environment [J]. Journal of Computer Applications, 2021, 41(11): 3257-3265. |
[3] | Guangfu WU, Ziheng DAI. Cascaded quasi-cyclic moderate-density parity-check code based public key scheme for resisting reaction attack [J]. Journal of Computer Applications, 2021, 41(11): 3274-3280. |
[4] | Li LI, Hongfei YANG, Xiuze DONG. Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J]. Journal of Computer Applications, 2021, 41(11): 3251-3256. |
[5] | Lifeng GUO, Qianli WANG. Adaptive secure outsourced attribute-based encryption scheme with keyword search [J]. Journal of Computer Applications, 2021, 41(11): 3266-3273. |
[6] | Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN. Searchable encryption scheme based on splittable inverted index [J]. Journal of Computer Applications, 2021, 41(11): 3288-3294. |
[7] | . Key Rcovery Attack of Blow-CAST-Fish Based on Differential Tables [J]. Journal of Computer Applications, 0, (): 0-0. |
[8] | . Deep robust watermarking algorithm based on multiscale knowledge learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[10] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[11] | . Efficient robust zero watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moments [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | XU Liyun, YAN Tao, QIAN Yuhua. Audio encryption algorithm in fractional domain based on cascaded chaotic system [J]. Journal of Computer Applications, 2021, 41(9): 2623-2630. |
[13] | CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian. Differential privacy high-dimensional data publishing method via clustering analysis [J]. Journal of Computer Applications, 2021, 41(9): 2578-2585. |
[14] | ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang. Detection method of domains generated by dictionary-based domain generation algorithm [J]. Journal of Computer Applications, 2021, 41(9): 2609-2614. |
[15] | GE Jihong, SHEN Tao. Energy data access control method based on blockchain [J]. Journal of Computer Applications, 2021, 41(9): 2615-2622. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||