军事学 >>> 军事学
搜索结果: 1-5 共查到军事学 Pre-computation相关记录5条 . 查询时间(0.176 秒)
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to establish a shared key in a way that is immune to offline attacks. Asymmetric PAKE (aPAKE) strength...
Let Ea:y2+xy=x3+ax2+1/F2mEa:y2+xy=x3+ax2+1/F2m be a Koblitz curve. The window ττ-adic nonadjacent-form (window ττNAF) is currently the standard representation system to perform scalar multiplications ...
Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose a novel protocol for privacy-preserving classific...
Koblitz curves have been a nice subject of consideration for both theoretical and practical interests. The window τ -adic algorithm of Solinas (window τNAF) is the most powerful method for computing...
The existing identity-based encryption (IBE) schemes based on pairings require pairing computations in encryption or decryption algorithm and it is a burden to each entity which has restricted computi...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...