Search

Your search keyword '"Modular exponentiation"' showing total 57 results

Search Constraints

Start Over You searched for: Descriptor "Modular exponentiation" Remove constraint Descriptor: "Modular exponentiation" Database Academic Search Index Remove constraint Database: Academic Search Index
57 results on '"Modular exponentiation"'

Search Results

1. Secure fully-verifiable outsourcing of modular exponentiation: two servers check each other: Secure fully-verifiable outsourcing...: O. Torki et al.

2. Implementing Montgomery Multiplication to Speed-Up the Computation of Modular Exponentiation of Multi-Bit Numbers.

3. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.

4. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids.

5. 模幂运算安全外包算法的新设计.

6. Design and verification of improved CMERE against power analysis attacks.

7. Verifiable outsourcing computation for modular exponentiation from shareable functions.

8. A randomised scheme for secured modular exponentiation against power analysis attacks.

9. Efficient PSoC Implementation of Modular Multiplication and Exponentiation Based on Serial-Parallel Combination.

10. Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.

11. FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections.

12. Computation of the 100 quadrillionth hexadecimal digit of π on a cluster of Intel Xeon Phi processors.

13. 65‐nm CMOS low‐energy RNS modular multiplier for elliptic‐curve cryptography.

14. A Fast Parallel Modular Exponentiation Algorithm.

15. Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure.

16. Performance evaluation of M-ary algorithm using reprogrammable hardware.

17. Batch verification of Digital Signatures: Approaches and challenges.

18. Comparative Modular Exponentiation with Randomized Exponent to Resist Power Analysis Attacks.

19. 多个模指数运算的安全外包方案.

20. Parallel algorithms for modular multi-exponentiation.

21. Efficient and verifiable algorithms for secure outsourcing of cryptographic computations.

22. Algorithm for modular exponentiation by block method in sparse form.

23. New Algorithms for Secure Outsourcing of Modular Exponentiations.

24. SOFTWARE/HARDWARE CO-DESIGN OF MODULAR EXPONENTIATION FOR EFFICIENT RSA CRYPTOSYSTEM.

25. SEARCH-BASED AUTOMATIC CODE GENERATION FOR MULTIPRECISION MODULAR EXPONENTIATION ON MULTIPLE GENERATIONS OF GPU.

26. Outsourcing computation of modular exponentiations in cloud computing.

27. Parallel modular exponentiation using load balancing without precomputation

28. Modular Multiplication and Exponentiation Architectures for Fast RSA Cryptosystem Based on Digit Serial Computation.

29. INFORMATION PROTECTION BASED ON FUZZY SYSTEM.

30. THEORETICAL BASES OF EXECUTION MODULAR MULTIPLICATION OPERATIONS AND EXPONENTIATION USING A THEORETICAL-NUMBERS BASES OF RADEMACHER-KRESTENSON.

31. Comparative Power Analysis of Modular Exponentiation Algorithms.

32. High-Performance Hardware of the Sliding-Window Method for Parallel Computation of Modular Exponentiations.

33. Another look at some fast modular arithmetic methods.

34. A HARDWARE/SOFTWARE CO-DESIGN VERSUS HARDWARE-ONLY IMPLEMENTATION OF MODULAR EXPONENTIATION USING THE SLIDING-WINDOW METHOD.

35. An Efficient Variant of Pollard's p − 1 for the Case That All Prime Factors of the p − 1 in B-Smooth.

36. Area and time efficient AB 2 multipliers based on cellular automata

37. Compact modular exponentiation accelerator for modern FPGA devices

38. An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques

39. Fast hardware for modular exponentiation with efficient exponent pre-processing

40. Efficient and secure cryptographic systems based on addition chains: Hardware design vs. software/hardware co-design

41. Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations.

42. How to compute modular exponentiation with large operators based on the right-to-left binary algorithm

43. A survey of algebraic properties used in cryptographic protocols.

44. A Memory Optimized Public-Key Crypto Algorithm Using Modified Modular Exponentiation (MME).

45. An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications.

46. Meta-He digital signatures based on factoring and discrete logarithms

47. Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques.

48. Fast exponentiation by folding the signed-digit exponent in half.

49. PARTITION ALGORITHM FOR PARALLEL PROCESSING OF ARRAY MULTIPLICATION IN GF(2m) FIELDS.

50. Fast modular exponentiation of large numbers with large exponents

Catalog

Books, media, physical & digital resources