Search

Your search keyword '"Modular exponentiation"' showing total 467 results

Search Constraints

Start Over You searched for: Descriptor "Modular exponentiation" Remove constraint Descriptor: "Modular exponentiation" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
467 results on '"Modular exponentiation"'

Search Results

1. Secure fully-verifiable outsourcing of modular exponentiation: two servers check each other: Secure fully-verifiable outsourcing...: O. Torki et al.

2. Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

3. An efficient simulated annealing algorithm for short addition sequences

4. An efficient simulated annealing algorithm for short addition sequences.

5. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.

6. Using Genetic Algorithm in Inner Product to Resist Modular Exponentiation From Higher Order DPA Attacks

7. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids.

8. Low latency high throughput Montgomery modular multiplier for RSA cryptosystem

9. THE MODULAR EXPONENTIATION WITH PRECOMPUTATION OF REDUSED SET OF RESIDUES FOR FIXED-BASE.

10. An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation

11. Secure Data Sharing With Lightweight Computation in E-Health

12. The alternative Method to Finish Modular Exponentiation and Point Multiplication Processes.

13. THE RUNTIME ANALYSIS OF COMPUTATION OF MODULAR EXPONENTIATION.

14. Resisting HODPA attacks in modular exponentiation using inner product with differential evolution.

15. On the (In)Security of ElGamal in OpenPGP

16. An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption

17. Modular exponentiation with inner product to resist higher-order DPA attacks.

18. Secure outsource computing scheme of modular exponentiation based on single server

19. CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

20. Performance evaluation of M-ary algorithm using reprogrammable hardware

21. Design and Analysis of RSA and Paillier Homomorphic Cryptosystems Using PSO-Based Evolutionary Computation

22. Efficient PSoC Implementation of Modular Multiplication and Exponentiation Based on Serial-Parallel Combination.

23. Fast and Area Efficient Implementation of RSA Algorithm.

24. Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing.

25. Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis

26. FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections.

27. Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-Grained Cache Attacks.

28. 65‐nm CMOS low‐energy RNS modular multiplier for elliptic‐curve cryptography.

29. Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures

30. THE RUNTIME ANALYSIS OF COMPUTATION OF MODULAR EXPONENTIATION

31. Cryptanalysis of Modular Exponentiation Outsourcing Protocols

32. Performance evaluation of M-ary algorithm using reprogrammable hardware.

33. Simple power analysis attack against cryptosystems based on Montgomery algorithm

34. Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication

35. Parallel modular multiplication using 512-bit advanced vector instructions

36. Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm

37. Pairing-Free for Public Key Encryption With Equality Test Scheme

38. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids

39. Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-Grained Cache Attacks

40. Another look at some fast modular arithmetic methods

41. Метод захищеного обчислення модулярної експоненти на віддалених обчислювальних платформах

42. Fast secure calculation of the open key cryptography procedures for IoT in clouds

43. Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.

44. Comment on 'An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption'

45. Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server

46. A Low Latency Montgomery Modular Exponentiation

47. Statistical security analysis of AES with X‐tolerant response compactor against all types of test infrastructure attacks with/without novel unified countermeasure

48. Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing

49. Spectacular Exponents: A semi modular Approach to Fast Exponentiation

50. Maximum Number of Steps Taken by Modular Exponentiation and Euclidean Algorithm

Catalog

Books, media, physical & digital resources