找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography; Efficient Modular Ex Satyanarayana Vollala,N. Ramasubramanian,

[復(fù)制鏈接]
樓主: 他剪短
21#
發(fā)表于 2025-3-25 05:01:34 | 只看該作者
https://doi.org/10.1007/978-3-319-01360-2 given BFW techniques have been estimated with respect to energy, power and throughput. The performance of PKCs can be enhanced either by hardware or by software approaches. The software approaches are simple and less complex for maintaining, on the other hand, hardware approaches are more secure wh
22#
發(fā)表于 2025-3-25 11:00:39 | 只看該作者
https://doi.org/10.1007/978-981-16-8229-2 simultaneously, for achieving higher throughput with a constant frequency. As we know that, modular exponentiation is a series of modular multiplications and in order to achieve better performance, we need an efficient implementation of modular multiplication. The modular multiplication has costly
23#
發(fā)表于 2025-3-25 13:45:14 | 只看該作者
24#
發(fā)表于 2025-3-25 18:01:01 | 只看該作者
25#
發(fā)表于 2025-3-25 22:39:31 | 只看該作者
26#
發(fā)表于 2025-3-26 03:35:02 | 只看該作者
27#
發(fā)表于 2025-3-26 07:13:02 | 只看該作者
Modular Exponential Techniquesy modulus operation over exponentiation operation. Modulus operation reduces the size of intermediate and final results but increases the division operation overhead. This . has significant applications in Cryptosystem. In this chapter four modular exponential techniques will be discussed.
28#
發(fā)表于 2025-3-26 11:47:39 | 只看該作者
Review of Algorithmic Techniques for Improving the Performance of Modular Exponentiationodular exponentiation. If we wish to optimize the time complexity of the PKC, it is essential to develop a transformation algorithm that minimizes the required number of modular multiplications. If we succeed in minimizing the number of required modular multiplications it will result in the reductio
29#
發(fā)表于 2025-3-26 14:04:20 | 只看該作者
30#
發(fā)表于 2025-3-26 19:28:41 | 只看該作者
Introduction to Montgomery MultiplicationSA algorithm and Diffie–Hellman algorithm. These algorithms are very much important to attain better information security over a public network. Cryptosystems have an important step of key exchange for which confidentiality is achieved by modular exponentiation. The modular exponentiation problem is
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 19:44
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
南康市| 城步| 调兵山市| 吴忠市| 秀山| 卓尼县| 临朐县| 司法| 商丘市| 涿鹿县| 乾安县| 桃园县| 出国| 壶关县| 思茅市| 扎兰屯市| 怀远县| 成武县| 岱山县| 高平市| 仲巴县| 玉山县| 拜泉县| 松桃| 平罗县| 安乡县| 裕民县| 天水市| 阿合奇县| 色达县| 翼城县| 内江市| 湾仔区| 邯郸市| 德安县| 陇川县| 含山县| 稻城县| 合作市| 江达县| 湟中县|