月旦知識庫
 
  1. 熱門:
 
首頁 臺灣期刊   法律   公行政治   醫事相關   財經   社會學   教育   其他 大陸期刊   核心   重要期刊 DOI文章
理工研究國際期刊 本站僅提供期刊文獻檢索。
  【月旦知識庫】是否收錄該篇全文,敬請【登入】查詢為準。
最新【購點活動】


篇名
Algorithm Designs and Complexity Analyses for Information Security
作者 Chia-Long Wu (Chia-Long Wu)
英文摘要
Modular exponentiation is composed of repetition of modular multiplication and is often the dominant part of modern cryptographic method. Taking the RSA cryptosystem for example, both the encryption and decryption operations are accomplished by modular exponentiation. It is performed by using successive modular multiplications. Exponentiation is to compute M^E for a positive integer E and modular exponentiation is to compute M^E mod N for positive integers E and N. When the lengths of the operators are at least 512 up to 2048 binary representations, modular exponentiation can be time-consuming and is often the dominant part of the computation in many computer systems. In this paper, I will describe some methods, which use some software. Most importantly, I will analyze the computational complexities for these methods respectively.
起訖頁 1-4
刊名 理工研究國際期刊  
期數 201403 (4:1期)
出版單位 國立臺南大學
該期刊-下一篇 PBB over H-VPLS技術應用於多點L2 VPN服務
 

新書閱讀



最新影音


優惠活動




讀者服務專線:+886-2-23756688 傳真:+886-2-23318496
地址:臺北市館前路28 號 7 樓 客服信箱
Copyright © 元照出版 All rights reserved. 版權所有,禁止轉貼節錄