他剪短 发表于 2025-3-21 19:23:15
书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0310574<br><br> <br><br>书目名称Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0310574<br><br> <br><br>averse 发表于 2025-3-21 20:41:32
http://reply.papertrans.cn/32/3106/310574/310574_2.pngCHURL 发表于 2025-3-22 01:03:26
http://reply.papertrans.cn/32/3106/310574/310574_3.pngfoliage 发表于 2025-3-22 06:17:23
http://reply.papertrans.cn/32/3106/310574/310574_4.pngAsparagus 发表于 2025-3-22 09:52:09
http://reply.papertrans.cn/32/3106/310574/310574_5.png过剩 发表于 2025-3-22 13:35:58
Review of Hardware Techniques for Improving Performance of Modular Exponentiation also helps in reducing the cost. The hardware techniques greatly affect the execution of an algorithm. The hardware techniques used for the implementation of the core operations of the PKC are discussed in this chapter.过剩 发表于 2025-3-22 18:06:51
http://reply.papertrans.cn/32/3106/310574/310574_7.pngcertitude 发表于 2025-3-22 22:18:37
http://reply.papertrans.cn/32/3106/310574/310574_8.pngsemiskilled 发表于 2025-3-23 02:16:22
https://doi.org/10.1007/978-3-030-74524-0Public-Key Cryptography; Cyber Security; Energy Efficient Hardware; Information Security; Modular ExponeRADE 发表于 2025-3-23 08:52:09
http://reply.papertrans.cn/32/3106/310574/310574_10.png