Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography

English | 2021 | ISBN: 3030745236 | 277 Pages | PDF EPUB | 33 MB

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved?

Download:

http://longfiles.com/mzaw9ecddmkx/3030745236.7z.html

[Fast Download] Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography


Related eBooks:
Prepping: Survival Shelter: How To Make a SHTF Shelter for Snow, Desert And Forest Conditions
Survival Guide: Electromagnetic Pulse: How To Survive An EMP Attack (Survivalist)
TEXTBOOK OF Cryptography and Network Security
Dark Web and Deep Web: Place of anonymity and freedom of expression
Enemy Invasion Survival Guide
Why Hackers Win: Power and Disruption in the Network Society
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
Secure Data Management
CompTIA Security Certification Study Guide, Third Edition
Hackable: How to Do Application Security Right
Web Hacking 101: How to Make Money Hacking Ethically
Metasploit Penetration Testing Cookbook
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.