咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 1 篇 机械工程
    • 1 篇 信息与通信工程

主题

  • 4 篇 modular arithmet...
  • 2 篇 rsa
  • 2 篇 modular multipli...
  • 1 篇 table lookup
  • 1 篇 cmos integrated ...
  • 1 篇 look-up tables
  • 1 篇 digital arithmet...
  • 1 篇 information cont...
  • 1 篇 core circuit
  • 1 篇 public-key crypt...
  • 1 篇 algorithms
  • 1 篇 embedded systems
  • 1 篇 secret sharing s...
  • 1 篇 modular exponent...
  • 1 篇 0.35 micron
  • 1 篇 software impleme...
  • 1 篇 arithmetic compu...
  • 1 篇 modular reductio...
  • 1 篇 computer system ...
  • 1 篇 NOT FOUND

机构

  • 1 篇 tsing hua univ i...
  • 1 篇 univ cambridge t...
  • 1 篇 kharkov natl uni...
  • 1 篇 poltava natl tec...
  • 1 篇 kansai univ fac ...

作者

  • 1 篇 kuwakado hidenor...
  • 1 篇 yanko alina
  • 1 篇 selby a
  • 1 篇 mitchell c
  • 1 篇 martynenko anato...
  • 1 篇 sun yl
  • 1 篇 krasnobayev vict...
  • 1 篇 wu xj
  • 1 篇 koshman sergey

语言

  • 3 篇 英文
  • 1 篇 其他
检索条件"主题词=modular arithmetic operations"
4 条 记 录,以下是1-10 订阅
排序:
An area efficient modular arithmetic processor  5
An area efficient modular arithmetic processor
收藏 引用
5th International Conference on ASIC
作者: Sun, YL Wu, XJ Tsing Hua Univ Inst Microelect Beijing 100084 Peoples R China
RSA public-key cryptography and some other algorithms require various modular arithmetic operations. This paper presents an area efficient modular arithmetic processor. The operands can vary in size from 256 to 2048 b... 详细信息
来源: 评论
Method of Error Control of the Information Presented in the modular Number System
Method of Error Control of the Information Presented in the ...
收藏 引用
International Scientific-Practical Conference - Problems of Infocommunications Science and Technology (PIC S&T)
作者: Krasnobayev, Victor Koshman, Sergey Yanko, Alina Martynenko, Anatolii Kharkov Natl Univ Kharkov Ukraine Poltava Natl Tech Yuri Kondratyuk Univ Poltava Ukraine
A method for error control in the modular number system (MNS) based on the use of the zeroing procedure is proposed. This method is designed to verify the correct implementation of the computing process of computer sy... 详细信息
来源: 评论
ALGORITHMS FOR SOFTWARE IMPLEMENTATIONS OF RSA
收藏 引用
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES 1989年 第3期136卷 166-170页
作者: SELBY, A MITCHELL, C UNIV CAMBRIDGE TRINITY COLL CAMBRIDGE CB2 1TQENGLAND
Two new algorithms that facilitate the implementation of RSA in software are described. Both algorithms are essentially concerned with performing modular arithmetic operations on very large numbers, which could be of ... 详细信息
来源: 评论
Secret Sharing Schemes Using Modulo-2m arithmetic operations
Secret Sharing Schemes Using Modulo-2<i><SUP>m</SUP></i> Ari...
收藏 引用
IEEE Conference on Dependable and Secure Computing (DSC)
作者: Kuwakado, Hidenori Kansai Univ Fac Informat 2-1-1 Ryozenji Cho Takatsuki Osaka 5691095 Japan
Cloud services using secret sharing schemes have been launched recently. Since secret sharing schemes have been usually achieved over a finite field, the throughput for sharing and reconstructing a secret depends on t... 详细信息
来源: 评论