军事学 >>> 军事学
搜索结果: 1-8 共查到军事学 SIMD相关记录8条 . 查询时间(0.062 秒)
Improved SIMD Implementation of Poly1305     MAC  Poly1305  Horner       font style='font-size:12px;'> 2019/7/22
Poly1305 is a polynomial hash function designed by Bernstein in 2005. Presently, it is part of several major platforms including the Transport Layer Security protocol. Vectorised implementation of Pol...
This paper investigates large linear mappings with very good diffusion and efficient software implementations, that can be used as part of a block cipher design. The mappings are derived from linear ...
Many cryptographic protocols derive their security from the apparent computational intractability of the integer factorization problem. Currently, the best known integer-factoring algorithms run in ...
This paper describes several new improvements of modular arithmetic and how to exploit them in order to gain more efficient implementations of commonly used algorithms, especially in cryptographic app...
Fully Homomorphic SIMD Operations     public-key cryptography       font style='font-size:12px;'> 2012/3/29
At PKC 2010 Smart and Vercauteren presented a variant of Gentry's fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations. The slow key generat...
Security Analysis of SIMD     secret-key cryptography  SIMD  SHA-3  hash function  distinguisher  security proof with distinguishers       font style='font-size:12px;'> 2010/7/13
In this paper we study the security of the SHA-3 candidate SIMD. We first show a new free-start distinguisher based on symmetry relations. It allows to distinguish the compression function of SIMD fro...
Cryptanalysis of the Compression Function of SIMD     SIMD  SHA-3 Candidate  near collision  distinguishing attack       font style='font-size:12px;'> 2010/7/13
SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modul...
In this paper we describe our high-speed hardware implementations of the 14 candidates of the second evaluation round of the SHA-3 hash function competition. We synthesized all implementations usin...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...