搜索结果: 1-10 共查到“军事学 residue”相关记录10条 . 查询时间(0.046 秒)
This paper presents an efficient algorithm for computing 11th11th-power residue symbols in the cyclotomic field Q(ζ11)Q(ζ11), where ζ11ζ11 is a primitive 11th11th root of unity. It extends an earlier ...
Identity-Based Encryption from e-th Power Residue Symbols
identity-based encryption ee-th power residue symbol the general reciprocity law on function fields
2019/5/27
This paper generalizes the notable Galbrath's test by introducing the general reciprocity law on function fields. With the help of the extended Galbrath's test, we show the scheme of Boneh, LaVigne an...
Construction of Lightweight MDS Matrices over Matrix Polynomial Residue Ring
MDS matrix XOR count matrix polynomial residue ring
2016/12/29
In this article, we investigate the construction of lightweight MDS matrices. The key contribution of present paper is constructing MDS matrices over matrix polynomial residue ring. To the best of our...
A new algorithm for residue multiplication modulo $2^{521}-1$
residue multiplication Toeplitz matrix-vector product Mersenne prime
2016/2/23
We present a new algorithm for residue multiplication modulo the Mersenne prime 2521−1 based on the Toeplitz matrix-vector product. For this modulo, our algorithm yields better result in terms o...
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Reduced-Precision Residue Number System Residue Number System (RNS) modular exponentiation
2016/1/5
We built and tested the first hardware implementation of Phatak’s Quotient-First Scaling (QFS) algorithm in the reduced-precision residue number system (RP-RNS). This algorithm is designed to expedite...
Efficient Cryptosystems From $2^k$-th Power Residue Symbols
quadratic residuosity Goldwasser-Micali cryptosystem
2014/3/11
Goldwasser and Micali (1984) highlighted the importance of randomizing the plaintext for public-key encryption and introduced the notion of semantic security. They also realized a cryptosystem meeting...
Permutation Polynomials and Their Differential Properties over Residue Class Rings
residue class ring Almost Perfect Nonlinear (APN)
2014/3/13
This paper mainly focuses on permutation polynomials over the residue class ring $\mathbb{Z}_{N}$, where $N>3$ is composite. We have proved that for the polynomial $f(x)=a_{1}x^{1}+\cdots +a_{k}x^{k}$...
Recently, a lot of progresses have been made in software implementations of pairings at the 128-bit security level in large characteristic. In this work, we obtain analogous progresses for hardware im...
Parallel Montgomery Multiplication in GF(2k) using Trinomial Residue Arithmetic
Finite field arithmetic Montgomery multiplication Polynomial residue arithmetic
2009/3/31
We propose the first general multiplication algorithm in GF(2k) with a subquadratic area
complexity of O(k8/5) = O(k1.6). Using the Chinese Remainder Theorem, we represent the
elements of GF(2k); i....
Parallel FPGA Implementation of RSA with Residue Number Systems— Can side-channel threats be avoided? —
RSA Residue Numbers Systems Side-Channels
2009/3/27
In this paper, we present a new parallel architecture to avoid
side-channel analyses such as: timing attack, simple/differential power
analysis, fault induction attack and simple/differential electr...