Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
Public-key cryptosystems are broadly employed to provide security for digital information. Improving the efficiency of public-key cryptosystem through speeding up calculation and using fewer resources are among themain goals of cryptography research. In this paper, we introduce new symbols extract...
| Main Authors: | Jahani, Shahram, Samsudin, Azman, Subramanian, Kumbakonam Govindarajan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Hindawi Publishing Corporation
2014
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/38934/ http://eprints.usm.my/38934/1/Efficient_Big_Integer_Multiplication_and_Squaring_Algorithms_for_Cryptographic_Applications.pdf |
Similar Items
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009)
by: Jahani , Shahram
Published: (2009)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
ZOT -Mk: A New Algorithm For Big Integer
Multiplication
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
An Enhanced Flower Pollination Algorithm For Multiple Sequence Alignment
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Tracking via Square Grid of RFID Reader Positioning and Diffusion Algorithm
by: Reza, Ahmed Wasif, et al.
Published: (2011)
by: Reza, Ahmed Wasif, et al.
Published: (2011)
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
Framework To Enhance Veracity And Quality Of Big Data
by: Ridzuan, Fakhitah
Published: (2021)
by: Ridzuan, Fakhitah
Published: (2021)
Anchor Point Approach For Initial
Population Of Bat Algorithm For
Protein Multiple Sequence Alignment
by: Boraik Ali, Aziz Nasser
Published: (2016)
by: Boraik Ali, Aziz Nasser
Published: (2016)
Simulation of vibrations of rectangular and square membranes using computer graphics
by: AROKIASAMY, A
Published: (2002)
by: AROKIASAMY, A
Published: (2002)
CDS504 – Enabling Technologies & Infrastructures for Big Data June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
CDS502 - Big Data Storage and Management (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
Competitive approaches to PSO algorithms via new acceleration co-efficient variant with mutation operators
by: Arumugam, , MS, et al.
Published: (2005)
by: Arumugam, , MS, et al.
Published: (2005)
CDS502 – Big Data Storage and Management
(Storan dan Pengurusan Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS502 – Big Data Storage and Management
(Storan dan Pengurusan Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CDS504 – Enabling Technologies & Infrastructures for Big Data
(Teknologi Pengupayaan & Prasarana untuk Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS504 – Enabling Technologies & Infrastructures For Big Data (Teknologi Pengupayaan & Prasarana Untuk Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS502 – Big Data Storage and Management(Storan dan Pengurusan Data Raya) - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Efficient motion sensing algorithm for camera-enabled mobile devices
by: Chang, Yoong Choon, et al.
Published: (2007)
by: Chang, Yoong Choon, et al.
Published: (2007)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
CDS504 – Enabling Technologies & Infrastructures for Big Data
(Teknologi Pengupayaan & Prasarana untuk Data Raya) - February/March 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video Transmission
by: Chang, Yoong Choon, et al.
Published: (2009)
by: Chang, Yoong Choon, et al.
Published: (2009)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
On the improved performances of the particle swarm optimization algorithms with adaptive parameters, cross-over operators and root mean square (RMS) variants for computing optimal control of a class of hybrid systems
by: Arumugam, M. Senthil, et al.
Published: (2008)
by: Arumugam, M. Senthil, et al.
Published: (2008)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Pair Bonds In Genetic Algorithm
by: Lim , Ting Yee
Published: (2015)
by: Lim , Ting Yee
Published: (2015)
A Simple Data Dependency Analyzer For C Programs.
by: Sodhy, Gian Chand, et al.
Published: (2002)
by: Sodhy, Gian Chand, et al.
Published: (2002)
Implementation Of Mediator-Based Integration System For A Transparent Access To Multiple Biological Databases.
by: Husain, Wahidah, et al.
Published: (2007)
by: Husain, Wahidah, et al.
Published: (2007)
Filtered Distance Matrix For
Constructing High-Throughput
Multiple Sequence Alignment On
Protein Data
by: Mohammad Abu-Hashem, Muhannad Abdul-Qader
Published: (2015)
by: Mohammad Abu-Hashem, Muhannad Abdul-Qader
Published: (2015)
Similar Items
-
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009) -
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009) -
ZOT -Mk: A New Algorithm For Big Integer
Multiplication
by: Jahani, Shahram
Published: (2009) -
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016) -
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)