Browsing by Subject "cryptography"
Now showing items 1-2 of 2
-
Extension and implementation of the mod without mod algorithm to efficiently compute the modulus of a number in hardware
(2020-12)This thesis discusses a hardware implementation of modulo that does not require a multiplication. This implementation is based on the algorithm proposed in Mark A. Will's "Mod without mod" in which the an algorithm is ... -
Finding Cases of Ciphertext equal to Plaintext in the RSA Algorithm
(Oklahoma State University, 2011-07-01)The RSA Algorithm is the most widely used public key encryption method that has survived the past 34 years of scrutiny and criticism. Studying and understanding RSA is important for a student of cryptography or information ...