X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
modular exponentiation (315) 315
cryptography (211) 211
algorithms (178) 178
modular multiplication (167) 167
rsa (127) 127
modular (123) 123
engineering, electrical & electronic (114) 114
multiplication (105) 105
hardware (100) 100
computer science, hardware & architecture (85) 85
computer science (73) 73
computer science, theory & methods (71) 71
computer science, information systems (67) 67
encryption (60) 60
exponentiation (59) 59
modular arithmetic (59) 59
algorithm design and analysis (57) 57
montgomery multiplication (57) 57
public key cryptography (57) 57
computer architecture (51) 51
fpga (49) 49
security (48) 48
computation (47) 47
mathematics, applied (45) 45
analysis (44) 44
field programmable gate arrays (43) 43
montgomery modular multiplication (41) 41
algorithm (39) 39
cloud computing (39) 39
architecture (37) 37
elliptic curve cryptography (37) 37
public-key cryptography (35) 35
mathematical analysis (34) 34
arithmetic (32) 32
mathematics (32) 32
research (31) 31
telecommunications (31) 31
clocks (30) 30
outsourcing (30) 30
verschlüsselung (29) 29
data encryption (27) 27
montgomery algorithm (27) 27
public-key cryptosystem (27) 27
usage (26) 26
mathematical models (25) 25
public key (25) 25
computer communication networks (24) 24
methods (24) 24
multipliers (24) 24
digital signatures (23) 23
systolic array (23) 23
computer arithmetic (22) 22
engineering (22) 22
rsa cryptosystem (22) 22
computational efficiency (21) 21
computer science, software engineering (21) 21
design (21) 21
integers (21) 21
number theory (20) 20
servers (20) 20
circuits (19) 19
computer information security (18) 18
registers (18) 18
software (18) 18
chinese remainder theorem (17) 17
digital arithmetic (17) 17
division (17) 17
kryptographie (17) 17
modular exponentiations (17) 17
signatures (17) 17
authentication (16) 16
cryptography and security (16) 16
design engineering (16) 16
modularity (16) 16
studies (16) 16
communications engineering, networks (15) 15
complexity theory (15) 15
data security (15) 15
implementation (15) 15
operating systems (15) 15
optimization (15) 15
outsourcing computation (15) 15
very large scale integration (15) 15
adders (14) 14
algebra (14) 14
delay (14) 14
multiplication & division (14) 14
circuits and systems (13) 13
cryptosystems (13) 13
gf (13) 13
modular reduction (13) 13
polynomials (13) 13
power analysis (13) 13
public key cryptosystem (13) 13
residue number system (13) 13
arithmetik (12) 12
complexity (12) 12
computer simulation (12) 12
computer systems (12) 12
cryptosystem (12) 12
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE transactions on parallel and distributed systems, ISSN 1045-9219, 2014, Volume 25, Issue 9, pp. 2386 - 2396
Journal Article
Applied Mathematics and Computation, ISSN 0096-3003, 01/2017, Volume 292, pp. 406 - 416
Modular exponentiation is a time-consuming operation widely used in cryptography... 
Modular multi-exponentiation | Algorithms | Cryptography | Parallelization | Modular exponentiation | MATHEMATICS, APPLIED | Analysis
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7459, pp. 541 - 556
Conference Proceeding
Arabian Journal for Science and Engineering, ISSN 2193-567X, 02/2018, Volume 43, Issue 2, pp. 903 - 911
Modular exponentiation is a fundamental and most time-consuming operation in several public-key cryptosystems such as the RSA cryptosystem... 
Binary method | Parallel algorithm | Scalability | Multiplication algorithm | Modular exponentiation | MULTIDISCIPLINARY SCIENCES | BINARY | MULTI-EXPONENTIATION
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 06/2010, Volume 59, Issue 6, pp. 795 - 807
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 09/2016, Volume 62, pp. 196 - 204
...., modular exponentiations, which are expensive for cloud environment where enormous data are collected from capability-limited devices, e.g... 
Batch encryption | Batch multi-exponentiation | Batch decryption | Cloud security | Modular exponentiation | Cramer–Shoup cryptosystem | MULTIPLICATION | SIGNATURES | Cramer-Shoup cryptosystem | COMPUTER SCIENCE, THEORY & METHODS | ALGORITHMS | VERIFICATION | Analysis | Algorithms
Journal Article
Journal of computer and system sciences, ISSN 0022-0000, 2017, Volume 90, pp. 1 - 13
.... With the development of cloud computing, the importance of security issues is increasing. Modular exponentiations are one of the basic and expensive operations of public key cryptography... 
High checkability | Secure outsourcing | Untrusted server | Modular exponentiations | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | BIG DATA | COMPUTER SCIENCE, THEORY & METHODS | SERVER-AIDED VERIFICATION | Analysis | Algorithms | Outsourcing
Journal Article
Journal of Cryptographic Engineering, ISSN 2190-8508, 06/2019, Volume 9, Issue 2, pp. 115 - 136
Digital Signature Algorithm (DSA) (resp. ECDSA) involves modular exponentiation (resp. scalar multiplication... 
Efficient software implementation | Multiplicative splitting | RNS | Modular exponentiation | Digital signature | Memory storage | Scalar multiplication | Fixed-base | Cryptography and Security | Computer Science
Journal Article
IEICE Electronics Express, ISSN 1349-2543, 05/2015, Volume 12, Issue 11
...)-first exponentiation. The proposed architecture features regularity, unidirectional data flow, and local interconnection, and thus is well suited to VLSI... 
Systolic array | Finite field arithmetic | Modular multiplication | modular multiplication | finite field arithmetic | FINITE-FIELDS GF(2M) | systolic array | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Quantum Information and Computation, ISSN 1533-7146, 05/2012, Volume 12, Issue 5-6, pp. 361 - 394
Reversible circuits for modular multiplication Cx%M with x < M arise as components of modular exponentiation in Shor's quantum number-factoring algorithm... 
Modular multiplication | Quantum circuits | Modular exponentiation | Shor's quantum factoring algorithm | QUANTUM SCIENCE & TECHNOLOGY | NETWORKS | COMPUTER SCIENCE, THEORY & METHODS | modular exponentiation | PHYSICS, MATHEMATICAL | modular multiplication | PHYSICS, PARTICLES & FIELDS
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 09/2018, Volume 118, pp. 102 - 112
Journal Article
Electronics Letters, ISSN 0013-5194, 10/1999, Volume 35, Issue 21, pp. 1831 - 1832
.... It has been observed that there is no need for extra cleaning up at the end of an exponentiation if the method is correctly set up. 
MODULAR MULTIPLICATION ALGORITHM | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, ISSN 0218-1266, 12/2019, Volume 28, Issue 13
...), namely the Modular Exponentiation (ME) and the Modular Multiplication (MM). Both operations are integrated as Programmable System on Chip (PSoC... 
RSA | PSoC | DESIGN | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | FPGA | Modular exponentiation | ARCHITECTURE | PKC | montgomery modular multiplication | ALGORITHMS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Journal of Computer and System Sciences, ISSN 0022-0000, 2012, Volume 78, Issue 2, pp. 575 - 582
The modular exponentiation operation of the current algorithms for asymmetric cryptography is the most expensive part in terms of computational cost... 
Load balancing | Cryptography | Modular exponentiation | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, THEORY & METHODS | Usage | Algorithms | Asymmetry | Computational efficiency | Modular | Proposals | Processors | Optimization
Journal Article
Journal of Cryptographic Engineering, ISSN 2190-8508, 9/2017, Volume 7, Issue 3, pp. 245 - 253
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2019, Volume 160, pp. 549 - 554
Modular exponentiation is an exponentiation performed over a modulus. It is useful in computer science, especially in the field of public-key cryptography... 
Altera Kit | Non-adjacent Form (NAF) Representation | Right-to-Left Modular Exponentiation Algorithm | Hardware synthesis | Cryptography | Number theory | FPGA design
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8712, Issue 1, pp. 326 - 343
Conference Proceeding
Cluster computing, ISSN 1573-7543, 2016, Volume 19, Issue 2, pp. 811 - 820
Journal Article
by Blum, T and Paar, C
IEEE Transactions on Computers, ISSN 0018-9340, 07/2001, Volume 50, Issue 7, pp. 759 - 764
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 10/2007, Volume 56, Issue 10, pp. 1308 - 1319
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.