The International Workshop on Information, Computation, and Control Systems for Distributed Environments 2020
DOI: 10.47350/iccs-de.2020.01
|View full text |Cite
|
Sign up to set email alerts
|

Neural network method for base extension in residue number system

Abstract: Confidential data security is associated with the cryptographic primitives, asymmetric encryption, elliptic curve cryptography, homomorphic encryption, cryptographic pseudorandom sequence generators based on an elliptic curve, etc. For their efficient implementation is often used Residue Number System that allows executing additions and multiplications on parallel computing channels without bit carrying between channels. A critical operation in Residue Number System implementations of asymmetric cryptosystems … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 16 publications
0
0
0
Order By: Relevance