exponentiation
英
美
n. 取幂,求幂,乘方
英英释义
noun
- the process of raising a quantity to some assigned power
双语例句
- A modular exponentiation for very large integers is one of the most common fundamental operations in many public-key cryptosystems.
模乘幂运算是公钥密码体制中最常用的基本运算,提高其运算速度可有效地提高公钥密码算法的加解密效率。 - To transform the Modular Exponentiation into multiple Modular Multiplication by a series of mathematical derivation.
通过一系列数学变换,将模幂运算变换成多次模乘运算。 - The window method is used to significantly reduce the number of modular multiplications needed for completing the modular exponentiation.
在设计中还采用了窗口法减少模幂运算过程中所需进行的模乘运算次数,大大提高了处理速度。 - The research of this paper has using value, improving the processing of encryption and decryption by fast implementation of modular exponentiation and modular multiplication algorithm.
RSA算法的快速实现是现代密码学研究的方向之一,本文研究表明通过改进公钥密码体制中的模幂乘算法,可以进一步提高RSA的效率,具有一定的实用价值。 - This paper introduced a method called "sliding-window" used in multiple-precision integer exponentiation arithmetic, and studied its application combined with Montgomery reduction, and how to calculate the "window size" related to the bits of the multiple-precision integer.
介绍了多精度整数求幂运算中的“滑动窗口”算法,并结合Montgomery约简算法,对“滑动窗口”算法进行了应用研究,分析了根据多精度整数的位数来确定相应的窗口大小。 - Read and analysis for the advanced research papers: fast exponentiation computation, multisignature, proxy signature, threshold signature, group signature, identification authentications, visitor control, Multisecret sharing.
阅读并讨论专题论文:快速指数运算、多重签名、代理签名、门限签名、群签名、身份认证、访问控制、(多)秘密共享。 - This paper presents a new algorithm to realize modular exponentiation multiplication by converting multiplication and modular operation into the simple shift and addition operation, thus avoiding modular operation on large number.
提出一种宏观累加模的快速模幂乘的算法,将乘法运算和求模运算转换成简单的移位运算和加法运算,从而避免了求模运算和减少大数相乘次数。 - A hardware design for modular exponentiation of big number
一种大数模幂的硬件实现设计 - Running this code verifies that exponentiation works ( modulo the bug I mentioned earlier), so half of the battle is now complete.
运行这段代码确保可以求幂(忽略我之前提到的bug),这样就完成了一半的工作。 - If we use exponentiation to encrypt or decrypt, the adversary can use logarithm to attack.
如果我们运用求幂运算来加密和解密,对手就可以运用对数进行攻击。
