搜索结果: 1-9 共查到“军队指挥学 modular exponentiation”相关记录9条 . 查询时间(0.038 秒)
Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
modular exponentiations secure outsourcing
2018/11/2
We investigate the problem of securely outsourcing modular exponentiations to a single, malicious computational resource. We revisit recently proposed schemes using single server and analyse them agai...
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Internet voting Modular exponentiations JavaScript cryptography
2018/4/3
Modern web applications using advanced cryptographic methods may need to calculate a large number of modular exponentiations. Performing such calculations in the web browser efficiently is a known pro...
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Shor's factoring algorithm quantum modular exponentiation superposition
2016/1/6
An efficient quantum modular exponentiation method is indispensible for Shor's factoring algorithm. But we find that all descriptions presented by Shor, Nielsen and Chuang, Markov and Saeedi, et al., ...
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
client puzzles time-lock puzzles enial of service resistance
2012/6/14
Client puzzles are moderately-hard cryptographic problems --- neither easy nor impossible to solve --- that can be used as a countermeasure against denial of service attacks on network protocols. Puzz...
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
client puzzles time-lock puzzles denial of service resistance RSA puzzle difficulty
2012/3/20
Client puzzles are moderately-hard cryptographic problems --- neither easy nor impossible to solve --- that can be used as a countermeasure against denial of service attacks on network protocols. Puzz...
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
client puzzles time-lock puzzles denial of service resistance
2012/8/28
Client puzzles are moderately-hard cryptographic problems --- neither easy nor impossible to solve --- that can be used as a countermeasure against denial of service attacks on network protocols. Puzz...
Efficient Software Implementations of Modular Exponentiation
modular arithmetic modular exponentiation Montgomery multiplication RSA
2012/3/28
RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. We ...
Efficient Software Implementations of Modular Exponentiation
modular exponentiation Montgomery multiplication RSA
2011/6/8
RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. We ...
Executing Modular Exponentiation on a Graphics Accelerator
Modular Exponentiation Graphics Accelerator
2008/8/27
Demand in the consumer market for graphics hardware that
accelerates rendering of 3D images has resulted in commodity devices capable
of astonishing levels of performance. These results were achieve...