Search

Your search keyword '"Modular exponentiation"' showing total 1,388 results

Search Constraints

Start Over You searched for: Descriptor "Modular exponentiation" Remove constraint Descriptor: "Modular exponentiation"
1,388 results on '"Modular exponentiation"'

Search Results

51. Efficient Montgomery Multiplication on GPUs

52. Efficient and Secure Delegation of Group Exponentiation to a Single Server

53. Extending Helios Towards Private Eligibility Verifiability

54. Batch Blind Signatures on Elliptic Curves

55. A randomised scheme for secured modular exponentiation against power analysis attacks.

56. Efficient PSoC Implementation of Modular Multiplication and Exponentiation Based on Serial-Parallel Combination.

57. Fast and Area Efficient Implementation of RSA Algorithm.

58. Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding.

59. Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing.

60. Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis

61. Secure Edge-Aided Computations for Social Internet-of-Things Systems

62. Data Possession Provability on Semi-trusted Cloud Storage

63. A Toolbox for DPA Attacks to Smart Cards

64. Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs

65. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

66. Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards

67. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage

68. Further Research on N-1 Attack against Exponentiation Algorithms

69. MicroACP - A Fast and Secure Reconfigurable Asymmetric Crypto-Processor : –Overhead Evaluation of Side-Channel Countermeasures–

70. On Double Exponentiation for Securing RSA against Fault Analysis

73. High-Performance Qualified Digital Signatures for X-Road

74. Malleable Signatures for Resource Constrained Platforms

75. Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations

76. Toward Generic Method for Server-Aided Cryptography

83. New Algorithms for Secure Outsourcing of Modular Exponentiations

84. Software Implementation of Modular Exponentiation, Using Advanced Vector Instructions Architectures

85. Experimenting with Fast Private Set Intersection

86. Generating Provable Primes Efficiently on Embedded Devices

87. Diffie-Hellman without Difficulty

88. On Round-Optimal Zero Knowledge in the Bare Public-Key Model

89. Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems

90. On Quisquater’s Multiplication Algorithm

91. Impeding Individual User Profiling in Shopper Loyalty Programs

92. BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)

93. Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance

95. An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments

96. Dynamic Private Modulus Based Password Conditional Privacy Preserving Authentication and Key-Agreement Protocol for VANET

97. Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures

100. Redundant Modular Reduction Algorithms

Catalog

Books, media, physical & digital resources