看到整数求幂运算。
If we use exponentiation to encrypt or decrypt, the adversary can use logarithm to attack.
如果我们运用求幂运算来加密和解密,对手就可以运用对数进行攻击。
The paper discusses how to improve the algorithms of the exponentiation calculation and them…
文章就如何改进大数乘幂算法和取余算法以提高RSA算法的运算速度进行了探讨。
On estimation of optimal window size in m_ary algorithm in modular exponentiation and point multiplication;
定义了大窗口和小窗口,指出经典蚁群算法实质上是大窗口蚁窗算法。
In this paper, We will discuss how to improve the algorithms of the exponentiation calculation and the mo...
本文将讨论如何改进大数乘幂算法和取余算法,以提高RSA算法的运算速度。
(An important exception is the notation for exponentiation: x raised to the power y is conveniently written as x**y).
(一个重要的不同是指数的表示法:为了方便,x 的y 次幂写为 x**y )。
In this case, the exponentiation operator is another form of binary operator so the existing BinaryOp case class serves.
在本例中,求幂运算符是另一种形式的二进制运算符,所以使用现有BinaryOp case类就可以。
Modular exponentiation is the most common fundamental and time consuming operation in RSA public-key cryptosystems.
模幂运算是RSA公钥密码算法中最基本也是最耗时的运算。
The algorithm is useful to speed up the operation for some cryptographic protocols based on multiple exponentiation.
此算法对基于多重取幂密码协议的快速运作是很有效用的。
The performance of RSA decryption has direct relationship with the efficiency of modular exponentiation implementation.
RSA算法的解密性能与大数模幂运算的实现效率有着直接的关系。
Running this code verifies that exponentiation works (modulo the bug I mentioned earlier), so half of the battle is now complete.
运行这段代码确保可以求幂(忽略我之前提到的bug),这样就完成了一半的工作。
Modul ar exponentiation algorithm scans encryption from right to sot, so t wo modular multiplications can be processed parallelly.
模幂算法采用从右到左扫描指数的方法,可以使得两次模乘运算同时进行。
The hardware architecture is made up of modular controller, modular exponentiation controller, data register, and modular multiplication operation units.
算法的硬件结构由模乘控制器、模幂控制器、数据寄存器和模乘运算单元构成。
What about Iran? The nuclear standoff still persists and fears will exponentiation of prices. According to The Daily Telegraph, Iran already raised petrol price by 25%.
伊朗又怎样呢?核问题的开发和担忧支持原油价格走高,每日电讯报道伊朗已经提高了25%的原油价格。
Exponentiation, which normally has higher precedence than addition or multiplication, is evaluated last in this example because the other expressions are enclosed in parentheses.
通常比加法或乘法具有更高优先级的求幂在此示例中最后计算,因为其他表达式都放在括号中。
In these public key cryptographic algorithms, the kernel operations are modular exponentiation of multi-precision integer and elliptic curve scalar multiplication, which both are computing intensive.
这些公钥密码算法的关键操作为大整数模幂乘操作与椭圆曲线标量乘法操作,均属于计算密集型运算。
Lie's Theory Within the framework of Lie' Theory, we associate infinitesimal transformations making up a Lie algebra with finite operations which are obtained from the previous ones by exponentiation.
另外,群体特性通过微分运算及其逆运算所得到的李代数的代数结构而得到了解释。
Lie's Theory Within the framework of Lie' Theory, we associate infinitesimal transformations making up a Lie algebra with finite operations which are obtained from the previous ones by exponentiation.
另外,群体特性通过微分运算及其逆运算所得到的李代数的代数结构而得到了解释。
应用推荐