๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

โœ Scribed by IEEE


Leaves
139
Category
Scientific

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Lattice-Based Public-Key Cryptography in
โœ Sujoy Sinha Roy, Ingrid Verbauwhede ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Springer Singapore ๐ŸŒ English

<p>This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It

Lattice-Based Public-Key Cryptography in
โœ Sujoy Sinha Roy; Ingrid Verbauwhede ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer Nature ๐ŸŒ English

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It in

Energy-Efficient Modular Exponential Tec
โœ Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly

Energy-Efficient Modular Exponential Tec
โœ Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly

Energy-Efficient Modular Exponential Tec
โœ Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly