Search

Your search keyword '"Modular exponentiation"' showing total 635 results

Search Constraints

Start Over You searched for: Descriptor "Modular exponentiation" Remove constraint Descriptor: "Modular exponentiation" Topic business.industry Remove constraint Topic: business.industry
635 results on '"Modular exponentiation"'

Search Results

1. On the (In)Security of ElGamal in OpenPGP

2. Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis

3. Secure Edge-Aided Computations for Social Internet-of-Things Systems

4. Dynamic Private Modulus Based Password Conditional Privacy Preserving Authentication and Key-Agreement Protocol for VANET

5. Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures

6. THE RUNTIME ANALYSIS OF COMPUTATION OF MODULAR EXPONENTIATION

7. Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications

8. HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs

9. Cryptanalysis of Modular Exponentiation Outsourcing Protocols

10. Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm

11. Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server

12. Pairing-Free for Public Key Encryption With Equality Test Scheme

13. Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance

14. Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things

15. Design and verification of improved CMERE against power analysis attacks

16. A Hybrid Addition Chaining Based Light Weight Security Mechanism for Enhancing Quality of Service in IoT

17. A Randomized Montgomery Powering Ladder Exponentiation for Side-Channel Attack Resilient RSA and Leakage Assessment

18. A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations

19. Secure Data Sharing With Lightweight Computation in E-Health

20. Comment on 'An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption'

21. Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server

22. A Low Latency Montgomery Modular Exponentiation

23. Statistical security analysis of AES with X‐tolerant response compactor against all types of test infrastructure attacks with/without novel unified countermeasure

24. A randomised scheme for secured modular exponentiation against power analysis attacks

25. Spectacular Exponents: A semi modular Approach to Fast Exponentiation

26. Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU

27. A High Speed Montgomery Multiplier used in Security Applications

28. Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange

29. Hardware-Software co-implementation of a high performance and light-weight scalable Systolic-Montgomery based modified RSA for portable IoT devices

30. Threat for the Secure Remote Password Protocol and a Leak in Apple’s Cryptographic Library

31. RSA Coprocessor Against Power Attack

32. Bit Forwarding Techniques for Efficient Modular Exponentiation

33. Hardware Implementation of Bit Forwarding Techniques

34. Review of Algorithmic Techniques for Improving the Performance of Modular Exponentiation

35. Improved Parallel RSA Cryptosystem with GPU for Network Information Security

36. Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption

37. Introduction to Montgomery Multiplication

38. RSA Processor for Concurrent Cryptographic Transformations

39. Review of Hardware Techniques for Improving Performance of Modular Exponentiation

40. Blockchain-Based Secure Outsourcing of Fully Homomorphic Encryption Using Hidden Ideal Lattice

41. Implementation of Modular Exponentiation in Dual-Core

42. Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing

43. Distributed Modular Multiplication to Be Processed by a Network of Limited Resources Devices

44. A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language

45. A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching

46. A novel accelerated implementation of RSA using parallel processing

47. High-Speed High-Throughput VLSI Architecture for RSA Montgomery Modular Multiplication with Efficient Format Conversion

48. An efficient attribute-based multi-keyword search scheme in encrypted keyword generation

49. Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation

50. Lossy Identification Schemes from Decisional RSA

Catalog

Books, media, physical & digital resources