scalar multiplication造句
例句與造句
- The definition of work suggests a third process of vector algebra, namely, scalar multiplication of two vectors .
功的定義用到矢量代數(shù)的第三種運(yùn)算,即兩個(gè)矢量的標(biāo)積。 - A markov - chain based performance analysis method for scalar multiplication on elliptic curve
鏈的橢圓曲線標(biāo)量乘法算法性能分析 - When the ratio of the execution time of point additions to that of point doublings is 3 during computing scalar multiplication , the parallel efficiency of the proposed algorithm could be best , 90 %
當(dāng)計(jì)算標(biāo)量乘的點(diǎn)加時(shí)間是點(diǎn)倍數(shù)時(shí)間的3倍時(shí),其并行效率最高可達(dá)到90 % 。 - ( 4 ) for the second hierarchy mentioned above , the key operation is the scalar multiplication , especially , the pairs of scalar multiplication used in certain practical elliptic curve cryptosystems
( 4 )對(duì)于第二層次的運(yùn)算,關(guān)鍵是點(diǎn)元素的標(biāo)量乘法運(yùn)算,特別是在某些具體的橢圓曲線密碼體制中需要直接計(jì)算標(biāo)量乘法對(duì)。 - In this paper , it applies the technique of artificial neural network to classify the em signals from the scalar multiplication in ecc , and gets the secret parameter in scalar multiplication successfully
文章針對(duì)橢圓曲線密碼系統(tǒng)中的標(biāo)量乘法運(yùn)算時(shí)發(fā)射的電磁信號(hào),運(yùn)用人工神經(jīng)網(wǎng)絡(luò)技術(shù)進(jìn)行分類判別,從而獲取標(biāo)量乘法中的秘密參量。 - It's difficult to find scalar multiplication in a sentence. 用scalar multiplication造句挺難的
- It is proved by its performance analysis and experimental results that the utilization of processors is increased , that all processors have better load balance . therefore the efficiency of computing scalar multiplication is heightened
其算法性能分析和實(shí)驗(yàn)結(jié)果證明:改進(jìn)算法可提高處理器的利用率,保證各處理器單元具有較好的負(fù)載均衡特性,從而加快標(biāo)量乘的計(jì)算速度。 - In this paper , we first introduces two fast elliptic scalar multiplications , signed odd - only comb method and width - w naf method . then , analyze their abilities to resist against power analysis . we also present improved scalar multiplication methods
本文以兩種常見的橢圓曲線快速算法? ? signedodd - onlycomb算法和width - wnaf算法為基礎(chǔ),對(duì)它們進(jìn)行能量分析攻擊,分析它們的抗能量分析攻擊性能,并提出相應(yīng)的改進(jìn)算法。 - In this new protocol , the key confirmation is incorporated into the authenticated key agreement , and its key confirmation is a hashed value of concatenation of the scalar multiplication of the long - term private key and ephemeral public key , and the scalar multiplication of the private key and long - term public key , which ensure that the protocol achieves forward secrecy , and resists key - compromise impersonation
在新協(xié)議中,加入了密鑰確認(rèn),其確認(rèn)密鑰由長期私鑰與臨時(shí)公鑰的積和臨時(shí)私鑰與長期公鑰的積串起來的哈希值,這確保它具有前向保密性和密鑰泄漏的安全性。 - Ecc is considered to be an alternative to rsa . this article provides a brief description of rsa public key cryptography and the associated knowledge , in particular introduces non - supersingular elliptic curves e which is established on the finite field fp with p > 3 , in - depth studies present existed scalar multiplication , further proposes an improved signed sliding window algorithm on ecc under the mixed coordinates , the improved algorithm compatible the advantage of the naf , has the least number of zero window and avoid a large number of inverse operation , successfully reduce scalar multiplication calculation
本文闡述了橢圓曲線及其相關(guān)知識(shí),特別說明了建立在有限域fp (其中p是大于3的素?cái)?shù))上的非奇異橢圓曲線e ,深入研究目前已有的各種標(biāo)量乘法,由此提出了橢圓曲線密碼算法在混合坐標(biāo)下改進(jìn)的帶符號(hào)滑動(dòng)窗口算法,該算法兼容了naf方法的優(yōu)點(diǎn),擁有最少數(shù)目的非零窗口數(shù),又避免了域元素上的大量求逆運(yùn)算,較成功地減少了標(biāo)量乘法計(jì)算量。 - The main place of innovation of this paper is to grasp the advantage of different algorithms , from different angles and levels improve modular exponentiation algorithm and scalar multiplication algorithm , and achieve new algorithm which can provide reference to the implementation of rsa and ecc , meantime the new algorithm have greater practical value
本文的創(chuàng)新點(diǎn)在于綜合各種算法在不同方面的優(yōu)勢,從不同角度和不同層次去改進(jìn)模冪算法和標(biāo)量乘算法,得到的新算法可供在實(shí)現(xiàn)rsa和橢圓曲線密碼體制時(shí)參考,具有較大的實(shí)用價(jià)值。 - Round these two respects , how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper . then we have analysed especially the scalar multiplication on the elliptic curves , and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division . this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method
圍繞這兩個(gè)方面的問題,本文首先討論了如何構(gòu)造安全的橢圓曲線密碼體制和橢圓曲線密碼體制的應(yīng)用;然后重點(diǎn)分析了橢圓曲線上數(shù)乘運(yùn)算的快速實(shí)現(xiàn),并結(jié)合interleavingexponentiation算法和冪分割的思想,提出一種計(jì)算固定點(diǎn)數(shù)乘的快速算法,該算法的計(jì)算速度明顯快于fixed - basewindowing算法,稍快于fixed - basecomb算法。 - In this new protocol , the authentication code of the its initiator depend on the shared long term key , but the authentication code of the its responder relies on session key , and the session key is a hashed value of concatenation of the long - term shared key , the scalar multiplication of the long - term private key and ephemeral public key , and the scalar multiplication of the private key and long - term public key , which ensure that the protocol resists key - compromise impersonation
在新協(xié)議中,協(xié)議起始方的認(rèn)證碼依賴于長期共享密鑰,但協(xié)議的應(yīng)答方的認(rèn)證碼依賴于會(huì)話密鑰,且會(huì)話密鑰是由長期共享密鑰、長期私鑰與臨時(shí)公鑰的積和臨時(shí)私鑰與長期公鑰的積三部分串起來的哈希值,這就保證它具有密鑰泄漏的安全性。