1,388 results on '"Modular exponentiation"'
Search Results
52. Efficient and Secure Delegation of Group Exponentiation to a Single Server
53. Extending Helios Towards Private Eligibility Verifiability
54. Batch Blind Signatures on Elliptic Curves
55. A randomised scheme for secured modular exponentiation against power analysis attacks.
56. Efficient PSoC Implementation of Modular Multiplication and Exponentiation Based on Serial-Parallel Combination.
57. Fast and Area Efficient Implementation of RSA Algorithm.
58. Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding.
59. Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing.
60. Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis
61. Secure Edge-Aided Computations for Social Internet-of-Things Systems
62. Data Possession Provability on Semi-trusted Cloud Storage
63. A Toolbox for DPA Attacks to Smart Cards
64. Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
65. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
66. Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
67. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage
68. Further Research on N-1 Attack against Exponentiation Algorithms
69. MicroACP - A Fast and Secure Reconfigurable Asymmetric Crypto-Processor : –Overhead Evaluation of Side-Channel Countermeasures–
70. On Double Exponentiation for Securing RSA against Fault Analysis
71. Using PKPSs with Tamper-Responsive Modules
72. An Efficient Variant of the Batch RSA Cryptosystem
73. High-Performance Qualified Digital Signatures for X-Road
74. Malleable Signatures for Resource Constrained Platforms
75. Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
76. Toward Generic Method for Server-Aided Cryptography
77. The LINT Public Interface: Members and Friends
78. Where All Roads Meet: Modular Exponentiation
79. Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks
80. Fault Attacks Against RSA-CRT Implementation
81. A Survey of Differential Fault Analysis Against Classical RSA Implementations
82. Side-Channel Analysis and Its Relevance to Fault Attacks
83. New Algorithms for Secure Outsourcing of Modular Exponentiations
84. Software Implementation of Modular Exponentiation, Using Advanced Vector Instructions Architectures
85. Experimenting with Fast Private Set Intersection
86. Generating Provable Primes Efficiently on Embedded Devices
87. Diffie-Hellman without Difficulty
88. On Round-Optimal Zero Knowledge in the Bare Public-Key Model
89. Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
90. On Quisquater’s Multiplication Algorithm
91. Impeding Individual User Profiling in Shopper Loyalty Programs
92. BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)
93. Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
94. RSA: Implementation and Security
95. An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments
96. Dynamic Private Modulus Based Password Conditional Privacy Preserving Authentication and Key-Agreement Protocol for VANET
97. Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures
98. Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
99. Fermat’s Little Theorem
100. Redundant Modular Reduction Algorithms
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.