找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography; Efficient Modular Ex Satyanarayana Vollala,N. Ramasubramanian,

[復(fù)制鏈接]
樓主: 他剪短
21#
發(fā)表于 2025-3-25 05:01:34 | 只看該作者
https://doi.org/10.1007/978-3-319-01360-2 given BFW techniques have been estimated with respect to energy, power and throughput. The performance of PKCs can be enhanced either by hardware or by software approaches. The software approaches are simple and less complex for maintaining, on the other hand, hardware approaches are more secure wh
22#
發(fā)表于 2025-3-25 11:00:39 | 只看該作者
https://doi.org/10.1007/978-981-16-8229-2 simultaneously, for achieving higher throughput with a constant frequency. As we know that, modular exponentiation is a series of modular multiplications and in order to achieve better performance, we need an efficient implementation of modular multiplication. The modular multiplication has costly
23#
發(fā)表于 2025-3-25 13:45:14 | 只看該作者
24#
發(fā)表于 2025-3-25 18:01:01 | 只看該作者
25#
發(fā)表于 2025-3-25 22:39:31 | 只看該作者
26#
發(fā)表于 2025-3-26 03:35:02 | 只看該作者
27#
發(fā)表于 2025-3-26 07:13:02 | 只看該作者
Modular Exponential Techniquesy modulus operation over exponentiation operation. Modulus operation reduces the size of intermediate and final results but increases the division operation overhead. This . has significant applications in Cryptosystem. In this chapter four modular exponential techniques will be discussed.
28#
發(fā)表于 2025-3-26 11:47:39 | 只看該作者
Review of Algorithmic Techniques for Improving the Performance of Modular Exponentiationodular exponentiation. If we wish to optimize the time complexity of the PKC, it is essential to develop a transformation algorithm that minimizes the required number of modular multiplications. If we succeed in minimizing the number of required modular multiplications it will result in the reductio
29#
發(fā)表于 2025-3-26 14:04:20 | 只看該作者
30#
發(fā)表于 2025-3-26 19:28:41 | 只看該作者
Introduction to Montgomery MultiplicationSA algorithm and Diffie–Hellman algorithm. These algorithms are very much important to attain better information security over a public network. Cryptosystems have an important step of key exchange for which confidentiality is achieved by modular exponentiation. The modular exponentiation problem is
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 08:46
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
潼关县| 曲靖市| 深圳市| 新营市| 朝阳区| 江山市| 商丘市| 手机| 金秀| 靖远县| 桦川县| 建水县| 磴口县| 株洲县| 沈阳市| 雅安市| 维西| 太仆寺旗| 凯里市| 镇原县| 大城县| 寿宁县| 平武县| 南宫市| 金坛市| 镇平县| 津市市| 灵川县| 山阳县| 镇沅| 玛多县| 威宁| 额济纳旗| 金乡县| 尉氏县| 孟津县| 宿迁市| 卢龙县| 乌兰察布市| 榆社县| 贡嘎县|