Journal of Computer Applications ›› 2015, Vol. 35 ›› Issue (6): 1673-1677.DOI: 10.11772/j.issn.1001-9081.2015.06.1673
Previous Articles Next Articles
WANG Guangsai1,2, ZENG Guang1,2, HAN Wenbao1,2, LI Yongguang1,2
Received:
2015-01-05
Revised:
2015-03-29
Online:
2015-06-12
王广赛1,2, 曾光1,2, 韩文报1,2, 李永光1,2
通讯作者:
王广赛(1990-),男,河南鹿邑人,硕士研究生,CCF会员,主要研究方向:公钥密码;sswang1990@yeah.net
作者简介:
曾光(1980-),男,吉林吉林人,副教授,博士,主要研究方向:网络密码;韩文报(1963-),男,河北邯郸人,教授,博士生导师,主要研究方向:密码理论、网络安全;李永光(1988-),男,河南淮阳人,硕士研究生,主要研究方向:分组密码。
基金资助:
国家自然科学基金资助项目(61003291);数学工程与先进计算国家重点实验室开放课题基金资助项目(2013A03,2013A10)。
CLC Number:
WANG Guangsai, ZENG Guang, HAN Wenbao, LI Yongguang. Fast greatest common divisor algorithm based on k-ary reduction[J]. Journal of Computer Applications, 2015, 35(6): 1673-1677.
王广赛, 曾光, 韩文报, 李永光. 基于k-ary消减的快速最大公约数算法[J]. 计算机应用, 2015, 35(6): 1673-1677.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2015.06.1673
[1] BUCHBERGER B, JEBELEAN T. Parallel rational arithmetic for computer algebra systems: motivating experiments [M]. Vienna: ACPC-Austrian Center for Parallel Computation, 1993: 1-3.查不到该文献, 作者确认是否有误。书名[M].出版地:出版社, 出版年:引用页码。 [2] LIOYD E K. The art of computer programming, vol. 2, seminumerical algorithms[J]. Software: Practice and Experience, 1982, 12(9): 883-884. [3] STEIN J. Computational problems associated with Racah algebra [J]. Journal of Computational Physics, 1967, 1(3): 397-405. [4] BRENT R P, KUNG H T. Systolic VLSI arrays for polynomial GCD computation [J]. IEEE Transactions on Computers, 1984, C-33 (8): 731-736. [5] YAP C K. Fundamental problems in algorithmic algebra [M]. Oxford: Oxford University Press, 核实是2000版还是1999-2000: 43-76. [6] STEHLÉ D, ZIMMERMANN P. A binary recursive gcd algorithm [C]//Proceedings of the 2004 6th International Symposium on Algorithmic Number Theory , LNCS 3076. Berlin: Springer, 2004: 411-425. [7] SORENSON J. Two fast GCD algorithms [J]. Journal of Algorithms, 1994, 16(1): 110-144. [8] JEBELEAN T. A generalization of the binary GCD algorithm [C]//Proceedings of the 1993 International Symposium on Symbolic and Algebraic Computation. New York: ACM, 1993: 111-116. [9] WEBER K.The accelerated integer GCD algorithm [J]. ACM Transactions on Mathematical Software, 1995, 21(1): 111-122. [10] SEDJELMACI S M. The mixed binary Euclid algorithm [J]. Electronic Notes in Discrete Mathematics, 2009, 35查过, 无期: 169-176. [11] MOHAMED F K. A novel fast hybrid GCD computation algorithm [J]. International Journal of Computing Science and Mathematics, 2014, 5(1): 37-47. [12] COHN H. Advanced number theory [M]. New York: Courier Dover Publications, 网上是19802012: 55-56. [13] SCHÖNHAGE A, STRASSEN V. Schnelle multiplikation grosser zahlen [J]. Computing, 1971, 查不到卷期, 核实卷期7(3/4): 281-292. [14] BRENT R P. Analysis of the binary Euclidean algorithm [EB/OL]. [2014-12-02]. http://maths-people.anu.edu.au/~brent/pd/rpb037a.pdf. Pittsburgh: Department of Computer Science, Carnegie-Mellon University, 1976: 321-355. |
[1] |
SHE Wei, MA Tianxiang, FENG Haige, TIAN Zhao, LIU Wei.
Blockchain covert communication method based on contract call concealment#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[2] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
[3] | Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE. Differential and linear characteristic analysis of full-round Shadow algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3839-3843. |
[4] | Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN. Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3717-3722. |
[5] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[6] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[7] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[8] | Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity management scheme based on identity-based proxy re-encryption [J]. Journal of Computer Applications, 2024, 44(12): 3723-3730. |
[9] |
DENG Yilin, YU Fajiang.
Pseudo-random number generator based on LSTM and separable self-attention mechanism#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[10] | . Correlation power analysis of advanced encryption standard algorithm based on uniform manifold approximation and projection [J]. Journal of Computer Applications, 0, (): 0-0. |
[11] | . Dynamic searchable encryption scheme based on puncture pseudorandom function [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | . fedPF: Federated learning for personalization and fairness [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . Review of research on conflict-based cache side-channel attacks and eviction sets [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | . Secure and efficient frequency estimation method based on shuffled differential privacy [J]. Journal of Computer Applications, 0, (): 0-0. |
[15] | . Blockchain-based model for notarization of simulation testing data in autonomous driving [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||