An optimization of tree topology based parallel cryptography
From MaRDI portal
Publication:1955306
DOI10.1155/2012/871091zbMath1264.94097OpenAlexW2085453313WikidataQ58912589 ScholiaQ58912589MaRDI QIDQ1955306
Masumeh Damrudi, Norafida Ithnin
Publication date: 11 June 2013
Published in: Mathematical Problems in Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2012/871091
Related Items (1)
Cites Work
- Unnamed Item
- Parallel modular exponentiation using load balancing without precomputation
- New iterative algorithms for modular multiplication
- Parallel depth first search. II: Analysis
- An optimization of tree topology based parallel cryptography
- How to compute modular exponentiation with large operators based on the right-to-left binary algorithm
- Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks
- FAST, PARALLEL AND SECURE CRYPTOGRAPHY ALGORITHM USING LORENZ'S ATTRACTOR
- A method for obtaining digital signatures and public-key cryptosystems
This page was built for publication: An optimization of tree topology based parallel cryptography