Search

Your search keyword '"Modular exponentiation"' showing total 23 results

Search Constraints

Start Over You searched for: Descriptor "Modular exponentiation" Remove constraint Descriptor: "Modular exponentiation" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
23 results on '"Modular exponentiation"'

Search Results

1. Secure fully-verifiable outsourcing of modular exponentiation: two servers check each other: Secure fully-verifiable outsourcing...: O. Torki et al.

2. Constructing a non-degeneracy 3D hyperchaotic map and application in image encryption.

3. Implementing Montgomery Multiplication to Speed-Up the Computation of Modular Exponentiation of Multi-Bit Numbers.

4. РЕАЛІЗАЦІЯ МНОЖЕННЯ МОНТГΟΜΕΡΙ ДЛЯ ПРИСКОРЕННЯ ОБЧИСЛЕННЯ МОДУЛЯРНОГО ЕКСПОНЕНЦІЮВАННЯ БАГАТОРОЗРЯДНИХ ЧИСЕЛ.

5. Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

6. An efficient simulated annealing algorithm for short addition sequences

7. An efficient simulated annealing algorithm for short addition sequences.

8. Challenges in data representation for efficient execution of encryption operation.

9. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.

10. High-Performance RNS Modular Exponentiation by Sum-Residue Reduction.

11. RSA & EXTENDED EUCLIDEAN ALGORITHM WITH EXAMPLES OF EXPONENTIAL RSA CIPHERS, RSA EXAMPLE SOLUTION WITH EXTENDED EUCLIDEAN ALGORITHM.

12. Design and implementation of a novel cryptographically secure pseudorandom number generator.

13. On the use of Montgomery multiplication in the computation of binary BBP-type formulas for mathematical constants.

14. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids.

15. Low latency high throughput Montgomery modular multiplier for RSA cryptosystem

16. 模幂运算安全外包算法的新设计.

17. On the (In)Security of ElGamal in OpenPGP

18. Design and Analysis of RSA and Paillier Homomorphic Cryptosystems Using PSO-Based Evolutionary Computation

19. Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis

20. Secure Edge-Aided Computations for Social Internet-of-Things Systems

21. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids

22. An Efficient Variant of Pollard’s p − 1 for the Case That All Prime Factors of the p − 1 in B-Smooth

23. An Efficient Variant of Pollard's p − 1 for the Case That All Prime Factors of the p − 1 in B-Smooth.

Catalog

Books, media, physical & digital resources