搜索结果: 1-2 共查到“军事学 modular exponentiations”相关记录2条 . 查询时间(0.108 秒)
Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
Verifiable and secure delegation modular exponentiations cloud security
2018/7/9
Security protocols using public-key cryptography often requires large number of costly modular exponentiations (MEs). With the proliferation of resource-constrained (mobile) devices and advancements i...
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
secure outsourcing algorithm modular exponentiations one-malicious model
2016/1/27
Outsourcing paradigm is one of the most attractive benefits of cloud computing,
where computation workloads can be outsourced to cloud servers by the resourceconstrained
devices, such as RFID tags. ...