RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication (original) (raw)

Communications in Computer and Information Science, 2011

Abstract

... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...

swapnil soner hasn't uploaded this paper.

Let swapnil know you want this paper to be uploaded.

Ask for this paper to be uploaded.