找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography; Efficient Modular Ex Satyanarayana Vollala,N. Ramasubramanian,

[復(fù)制鏈接]
樓主: 他剪短
21#
發(fā)表于 2025-3-25 05:01:34 | 只看該作者
https://doi.org/10.1007/978-3-319-01360-2 given BFW techniques have been estimated with respect to energy, power and throughput. The performance of PKCs can be enhanced either by hardware or by software approaches. The software approaches are simple and less complex for maintaining, on the other hand, hardware approaches are more secure wh
22#
發(fā)表于 2025-3-25 11:00:39 | 只看該作者
https://doi.org/10.1007/978-981-16-8229-2 simultaneously, for achieving higher throughput with a constant frequency. As we know that, modular exponentiation is a series of modular multiplications and in order to achieve better performance, we need an efficient implementation of modular multiplication. The modular multiplication has costly
23#
發(fā)表于 2025-3-25 13:45:14 | 只看該作者
24#
發(fā)表于 2025-3-25 18:01:01 | 只看該作者
25#
發(fā)表于 2025-3-25 22:39:31 | 只看該作者
26#
發(fā)表于 2025-3-26 03:35:02 | 只看該作者
27#
發(fā)表于 2025-3-26 07:13:02 | 只看該作者
Modular Exponential Techniquesy modulus operation over exponentiation operation. Modulus operation reduces the size of intermediate and final results but increases the division operation overhead. This . has significant applications in Cryptosystem. In this chapter four modular exponential techniques will be discussed.
28#
發(fā)表于 2025-3-26 11:47:39 | 只看該作者
Review of Algorithmic Techniques for Improving the Performance of Modular Exponentiationodular exponentiation. If we wish to optimize the time complexity of the PKC, it is essential to develop a transformation algorithm that minimizes the required number of modular multiplications. If we succeed in minimizing the number of required modular multiplications it will result in the reductio
29#
發(fā)表于 2025-3-26 14:04:20 | 只看該作者
30#
發(fā)表于 2025-3-26 19:28:41 | 只看該作者
Introduction to Montgomery MultiplicationSA algorithm and Diffie–Hellman algorithm. These algorithms are very much important to attain better information security over a public network. Cryptosystems have an important step of key exchange for which confidentiality is achieved by modular exponentiation. The modular exponentiation problem is
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 08:46
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
屯留县| 昆山市| 宜君县| 梁河县| 宁津县| 乌苏市| 内乡县| 怀宁县| 南安市| 白水县| 油尖旺区| 石屏县| 台南市| 铜川市| 灵寿县| 马关县| 赤壁市| 葫芦岛市| 双江| 乐清市| 景泰县| 建昌县| 贵州省| 南昌县| 屏东县| 潞城市| 孝义市| 登封市| 武功县| 富平县| 台南市| 和林格尔县| 南郑县| 沈丘县| 扎赉特旗| 梁平县| 宣化县| 柳林县| 武清区| 无锡市| 宁津县|