找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography; Efficient Modular Ex Satyanarayana Vollala,N. Ramasubramanian,

[復(fù)制鏈接]
樓主: 他剪短
21#
發(fā)表于 2025-3-25 05:01:34 | 只看該作者
https://doi.org/10.1007/978-3-319-01360-2 given BFW techniques have been estimated with respect to energy, power and throughput. The performance of PKCs can be enhanced either by hardware or by software approaches. The software approaches are simple and less complex for maintaining, on the other hand, hardware approaches are more secure wh
22#
發(fā)表于 2025-3-25 11:00:39 | 只看該作者
https://doi.org/10.1007/978-981-16-8229-2 simultaneously, for achieving higher throughput with a constant frequency. As we know that, modular exponentiation is a series of modular multiplications and in order to achieve better performance, we need an efficient implementation of modular multiplication. The modular multiplication has costly
23#
發(fā)表于 2025-3-25 13:45:14 | 只看該作者
24#
發(fā)表于 2025-3-25 18:01:01 | 只看該作者
25#
發(fā)表于 2025-3-25 22:39:31 | 只看該作者
26#
發(fā)表于 2025-3-26 03:35:02 | 只看該作者
27#
發(fā)表于 2025-3-26 07:13:02 | 只看該作者
Modular Exponential Techniquesy modulus operation over exponentiation operation. Modulus operation reduces the size of intermediate and final results but increases the division operation overhead. This . has significant applications in Cryptosystem. In this chapter four modular exponential techniques will be discussed.
28#
發(fā)表于 2025-3-26 11:47:39 | 只看該作者
Review of Algorithmic Techniques for Improving the Performance of Modular Exponentiationodular exponentiation. If we wish to optimize the time complexity of the PKC, it is essential to develop a transformation algorithm that minimizes the required number of modular multiplications. If we succeed in minimizing the number of required modular multiplications it will result in the reductio
29#
發(fā)表于 2025-3-26 14:04:20 | 只看該作者
30#
發(fā)表于 2025-3-26 19:28:41 | 只看該作者
Introduction to Montgomery MultiplicationSA algorithm and Diffie–Hellman algorithm. These algorithms are very much important to attain better information security over a public network. Cryptosystems have an important step of key exchange for which confidentiality is achieved by modular exponentiation. The modular exponentiation problem is
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 19:44
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
镇沅| 秀山| 平南县| 塔河县| 东安县| 钦州市| 错那县| 苏尼特右旗| 重庆市| 阿坝| 白河县| 汉川市| 青冈县| 乌恰县| 德昌县| 太湖县| 新河县| 金阳县| 逊克县| 英吉沙县| 丽水市| 靖远县| 石阡县| 扎鲁特旗| 聂荣县| 平谷区| 青浦区| 淅川县| 囊谦县| 五大连池市| 漠河县| 阿坝| 南宫市| 衡东县| 玉树县| 浮山县| 永春县| 江津市| 资阳市| 洛隆县| 喀什市|