找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography; Efficient Modular Ex Satyanarayana Vollala,N. Ramasubramanian,

[復(fù)制鏈接]
樓主: 他剪短
21#
發(fā)表于 2025-3-25 05:01:34 | 只看該作者
https://doi.org/10.1007/978-3-319-01360-2 given BFW techniques have been estimated with respect to energy, power and throughput. The performance of PKCs can be enhanced either by hardware or by software approaches. The software approaches are simple and less complex for maintaining, on the other hand, hardware approaches are more secure wh
22#
發(fā)表于 2025-3-25 11:00:39 | 只看該作者
https://doi.org/10.1007/978-981-16-8229-2 simultaneously, for achieving higher throughput with a constant frequency. As we know that, modular exponentiation is a series of modular multiplications and in order to achieve better performance, we need an efficient implementation of modular multiplication. The modular multiplication has costly
23#
發(fā)表于 2025-3-25 13:45:14 | 只看該作者
24#
發(fā)表于 2025-3-25 18:01:01 | 只看該作者
25#
發(fā)表于 2025-3-25 22:39:31 | 只看該作者
26#
發(fā)表于 2025-3-26 03:35:02 | 只看該作者
27#
發(fā)表于 2025-3-26 07:13:02 | 只看該作者
Modular Exponential Techniquesy modulus operation over exponentiation operation. Modulus operation reduces the size of intermediate and final results but increases the division operation overhead. This . has significant applications in Cryptosystem. In this chapter four modular exponential techniques will be discussed.
28#
發(fā)表于 2025-3-26 11:47:39 | 只看該作者
Review of Algorithmic Techniques for Improving the Performance of Modular Exponentiationodular exponentiation. If we wish to optimize the time complexity of the PKC, it is essential to develop a transformation algorithm that minimizes the required number of modular multiplications. If we succeed in minimizing the number of required modular multiplications it will result in the reductio
29#
發(fā)表于 2025-3-26 14:04:20 | 只看該作者
30#
發(fā)表于 2025-3-26 19:28:41 | 只看該作者
Introduction to Montgomery MultiplicationSA algorithm and Diffie–Hellman algorithm. These algorithms are very much important to attain better information security over a public network. Cryptosystems have an important step of key exchange for which confidentiality is achieved by modular exponentiation. The modular exponentiation problem is
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 08:46
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
左权县| 嘉义市| 南和县| 大悟县| 巨野县| 北安市| 高清| 枣强县| 班戈县| 遵义县| 汶川县| 安泽县| 洛扎县| 明星| 惠来县| 黔东| 武汉市| 曲水县| 大安市| 华蓥市| 固安县| 恩施市| 揭西县| 精河县| 乾安县| 焉耆| 额济纳旗| 高阳县| 嵊泗县| 阳信县| 博兴县| 满洲里市| 勐海县| 会泽县| 乌鲁木齐市| 武乡县| 红安县| 兰溪市| 广州市| 珠海市| 尚志市|