CORC

浏览/检索结果: 共18条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server 期刊论文
IEEE Transactions on Cloud Computing, 2018
作者:  Ren, Yanli[1];  Dong, Min[2];  Qian, Zhenxing[3];  Zhang, Xinpeng[4];  Feng, Guorui[5]
收藏  |  浏览/下载:13/0  |  提交时间:2019/04/22
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server 期刊论文
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, 卷号: E101A, 页码: 608-611
作者:  Dong, Min[1];  Ren, Yanli[2];  Feng, Guorui[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
High Performance of RSA Simulation System Based on Modified Montgomery Algorithm 会议论文
Joint Conference of the 16th Asia Simulation Conference / SCS International Autumn Simulation Multi-Conference (AsiaSim/SCS AutumnSim), 2016-01-01
作者:  Liu, Jingjing[1];  Chen, Guanghua[2];  Xiao, Zhanpeng[3];  Ma, Shiwei[4];  Liu, Wanquan[5]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/26
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability 会议论文
11th ACM Asia Conference on Computer and Communications Security (ASIA CCS), 2016-05-30
作者:  Ren, Yanli[1];  Ding, Ning[2];  Zhang, Xinpeng[3];  Lu, Haining[4];  Gu, Dawu[5]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/26
Quantum algorithm for polynomial root finding problem 其他
2015-01-01
Sun, Guodong; Su, Shenghui; Xu, Maozhi
收藏  |  浏览/下载:5/0  |  提交时间:2015/11/17
基于流水线技术的并行模幂算法硬件实现 期刊论文
2013
黄世伟; 王云峰
收藏  |  浏览/下载:3/0  |  提交时间:2016/05/17
A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation" 期刊论文
INFORMATION SCIENCES, 2013, 卷号: 223, 页码: 331-334
作者:  Sun, Da-Zhi;  Huai, Jin-Peng;  Cao, Zhen-Fu
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/06
A randomized binary modular exponentiation based RSA algorithm against the comparative power analysis 会议论文
Intelligent Control, Automatic Detection and High-End Equipment (ICADE), 2012 IEEE International Conference on, 中国
作者:  Xucheng Yin;  Keke Wu;  Huiyun Li;  Guoqing Xu
收藏  |  浏览/下载:18/0  |  提交时间:2015/08/25
Simple power analysis attacks using chosen message against ECC hardware implementations 会议论文
World Congress on Internet Security, WorldCIS-2011, London, United kingdom
作者:  Huiyun Li;  keke Wu;  Guoqing Xu;  Hai Yuan;  Peng Luo
收藏  |  浏览/下载:14/0  |  提交时间:2015/08/25
simple power analysis attacks using chosen message against ecc hardware implementations 会议论文
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun; Wu Keke; Xu Guoqing; Yuan Hai; Luo Peng
收藏  |  浏览/下载:22/0  |  提交时间:2011/10/10


©版权所有 ©2017 CSpace - Powered by CSpace