搜索结果: 1-2 共查到“军事学 Technology”相关记录2条 . 查询时间(0.562 秒)
On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
Target Technology SHA-3 Hardware Benchmark Rankings
2010/10/26
Both FPGAs and ASICs are widely used as the technology for comparing SHA-3 hardware benchmarking process. However, the impact of target technology in SHA-3 hardware benchmark rankings has hardly been ...
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology
Cut-and-Choose Verifiable Encryption Fair Exchange Protocols Trusted Computing Technology
2009/9/11
Cut-and-choose is used in interactive zero-knowledge protocols in which a prover answers a series
of random challenges that establish with high probability that the prover is honestly following the d...