scalar multiplication造句
例句与造句
- The definition of work suggests a third process of vector algebra, namely, scalar multiplication of two vectors .
功的定义用到矢量代数的第三种运算,即两个矢量的标积。 - A markov - chain based performance analysis method for scalar multiplication on elliptic curve
链的椭圆曲线标量乘法算法性能分析 - When the ratio of the execution time of point additions to that of point doublings is 3 during computing scalar multiplication , the parallel efficiency of the proposed algorithm could be best , 90 %
当计算标量乘的点加时间是点倍数时间的3倍时,其并行效率最高可达到90 % 。 - ( 4 ) for the second hierarchy mentioned above , the key operation is the scalar multiplication , especially , the pairs of scalar multiplication used in certain practical elliptic curve cryptosystems
( 4 )对于第二层次的运算,关键是点元素的标量乘法运算,特别是在某些具体的椭圆曲线密码体制中需要直接计算标量乘法对。 - In this paper , it applies the technique of artificial neural network to classify the em signals from the scalar multiplication in ecc , and gets the secret parameter in scalar multiplication successfully
文章针对椭圆曲线密码系统中的标量乘法运算时发射的电磁信号,运用人工神经网络技术进行分类判别,从而获取标量乘法中的秘密参量。 - It's difficult to find scalar multiplication in a sentence. 用scalar multiplication造句挺难的
- It is proved by its performance analysis and experimental results that the utilization of processors is increased , that all processors have better load balance . therefore the efficiency of computing scalar multiplication is heightened
其算法性能分析和实验结果证明:改进算法可提高处理器的利用率,保证各处理器单元具有较好的负载均衡特性,从而加快标量乘的计算速度。 - In this paper , we first introduces two fast elliptic scalar multiplications , signed odd - only comb method and width - w naf method . then , analyze their abilities to resist against power analysis . we also present improved scalar multiplication methods
本文以两种常见的椭圆曲线快速算法? ? signedodd - onlycomb算法和width - wnaf算法为基础,对它们进行能量分析攻击,分析它们的抗能量分析攻击性能,并提出相应的改进算法。 - In this new protocol , the key confirmation is incorporated into the authenticated key agreement , and its key confirmation is a hashed value of concatenation of the scalar multiplication of the long - term private key and ephemeral public key , and the scalar multiplication of the private key and long - term public key , which ensure that the protocol achieves forward secrecy , and resists key - compromise impersonation
在新协议中,加入了密钥确认,其确认密钥由长期私钥与临时公钥的积和临时私钥与长期公钥的积串起来的哈希值,这确保它具有前向保密性和密钥泄漏的安全性。 - Ecc is considered to be an alternative to rsa . this article provides a brief description of rsa public key cryptography and the associated knowledge , in particular introduces non - supersingular elliptic curves e which is established on the finite field fp with p > 3 , in - depth studies present existed scalar multiplication , further proposes an improved signed sliding window algorithm on ecc under the mixed coordinates , the improved algorithm compatible the advantage of the naf , has the least number of zero window and avoid a large number of inverse operation , successfully reduce scalar multiplication calculation
本文阐述了椭圆曲线及其相关知识,特别说明了建立在有限域fp (其中p是大于3的素数)上的非奇异椭圆曲线e ,深入研究目前已有的各种标量乘法,由此提出了椭圆曲线密码算法在混合坐标下改进的带符号滑动窗口算法,该算法兼容了naf方法的优点,拥有最少数目的非零窗口数,又避免了域元素上的大量求逆运算,较成功地减少了标量乘法计算量。 - The main place of innovation of this paper is to grasp the advantage of different algorithms , from different angles and levels improve modular exponentiation algorithm and scalar multiplication algorithm , and achieve new algorithm which can provide reference to the implementation of rsa and ecc , meantime the new algorithm have greater practical value
本文的创新点在于综合各种算法在不同方面的优势,从不同角度和不同层次去改进模幂算法和标量乘算法,得到的新算法可供在实现rsa和椭圆曲线密码体制时参考,具有较大的实用价值。 - Round these two respects , how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper . then we have analysed especially the scalar multiplication on the elliptic curves , and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division . this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method
围绕这两个方面的问题,本文首先讨论了如何构造安全的椭圆曲线密码体制和椭圆曲线密码体制的应用;然后重点分析了椭圆曲线上数乘运算的快速实现,并结合interleavingexponentiation算法和幂分割的思想,提出一种计算固定点数乘的快速算法,该算法的计算速度明显快于fixed - basewindowing算法,稍快于fixed - basecomb算法。 - In this new protocol , the authentication code of the its initiator depend on the shared long term key , but the authentication code of the its responder relies on session key , and the session key is a hashed value of concatenation of the long - term shared key , the scalar multiplication of the long - term private key and ephemeral public key , and the scalar multiplication of the private key and long - term public key , which ensure that the protocol resists key - compromise impersonation
在新协议中,协议起始方的认证码依赖于长期共享密钥,但协议的应答方的认证码依赖于会话密钥,且会话密钥是由长期共享密钥、长期私钥与临时公钥的积和临时私钥与长期公钥的积三部分串起来的哈希值,这就保证它具有密钥泄漏的安全性。