exponentiation 中文意思是什麼

音標 ['ekspəʊˌnenʃi'eiʃən]
exponentiation 解釋
n. 名詞 【數學】取冪。

  1. We need to know how hard it is to reverse the exponentiation

    我們需要知道求冪運算的逆運算的難度。
  2. When more than one exponentiation is performed in a single expression, the

    如果在單個表達式中執行多個求冪運算,則按
  3. Exponentiation uses the

    求冪使用
  4. If we use exponentiation to encrypt or decrypt, the adversary can use logarithm to attack

    如果我們運用求冪運算來加密和解密,對手就可以運用對數進行攻擊。
  5. First, computers have circuits for performing arithmetic operations, such as : addition, subtraction, division, multiplication and exponentiation

    第一,計算機具有進行加、減、乘、除及取冪等各種算術運算的電路。
  6. However the time - consuming modulo exponentiation computation, which has always been the bottle - neck of rsa, restricts its wider application

    但該演算法所採用的冪剩餘計算會耗費太多的時間,一直是制約其廣泛應用的瓶頸。
  7. Exponentiation fermat ' s little theorem sometimes is helpful for quickly finding a solution to some exponentiations. the following examples show the idea

    雖然我們在本章後面只了解該定理的某些應用,但這該定理在解決一些問題時還是非常有用的。
  8. Exponentiation, which normally has higher precedence than addition or multiplication, is evaluated last in this example because the other expressions are enclosed in parentheses

    通常比加法或乘法具有更高優先級的求冪在此示例中最後計算,因為其他表達式都放在括號中。
  9. At the same time, it is relatively colorfully that this paper makes use of some proverties of topological spaces to discuss the problems about countable ordinal exponentiation arithmetic

    同時,本文用拓撲空間的一些性質來討論集合論中的可數序數指數運算問題也比較精彩。
  10. The key of rsa is the modular exponentiation multiplication of large number, in this thesis, we modify the montgomery algorithm which be used to implement rsa

    Rsa演算法的核心是大數模冪乘運算,本文選用montgomery模冪乘演算法來實現ras演算法,對montgomery模乘演算法的fpga實現進行了改進。
  11. The main place of innovation of this paper is to grasp the advantage of different algorithms, from different angles and levels improve modular exponentiation algorithm and scalar multiplication algorithm, and achieve new algorithm which can provide reference to the implementation of rsa and ecc, meantime the new algorithm have greater practical value

    本文的創新點在於綜合各種演算法在不同方面的優勢,從不同角度和不同層次去改進模冪演算法和標量乘演算法,得到的新演算法可供在實現rsa和橢圓曲線密碼體制時參考,具有較大的實用價值。
  12. Round these two respects, how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper. then we have analysed especially the scalar multiplication on the elliptic curves, and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division. this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method

    圍繞這兩個方面的問題,本文首先討論了如何構造安全的橢圓曲線密碼體制和橢圓曲線密碼體制的應用;然後重點分析了橢圓曲線上數乘運算的快速實現,並結合interleavingexponentiation演算法和冪分割的思想,提出一種計算固定點數乘的快速演算法,該演算法的計算速度明顯快于fixed - basewindowing演算法,稍快于fixed - basecomb演算法。
  13. One special feature of this paper is that it provides fast implementation means for the all kinds of modular exponentiation algorithms, which facilitate the implementation of the rsa public key algorithms. the paper improved the sliding window algorithm by largely reducing the space complexity. meanwhile this paper represents an efficient combined algorithm to improve the processing of encryption and decryption

    大數模冪乘運算是實現rsa等公鑰密碼的基本運算,其運行效率決定了rsa公鑰密碼的性能,文章主要研究了各種模冪演算法的快速實現方法,提出運用組合演算法的思想來減少演算法運行時間;並對滑動窗口取冪演算法進行了部分改進,用線性表來存儲預計算數據,從而減少了演算法的復雜度,進一步提高了rsa加/解密的效率,並在試驗測試中得到較為滿意的結果。
  14. The latter pay special attention to the software implementation environments, including the technical details such as programming interface, data structures and 32 - bits visual c + + inline assembler. a sorftware packet is designed and implemented at last, which can perform the modular multiplication with equal 2048 - bits long of modulu and operands within approximately 5. 239ms and the modular exponentiation with equal 2048 - bits long of modulu, exponent and base within approximately 4290. 559ms

    經測試,在intelceleron400mhz , ram64mb的pc機上,進行一次乘數與被乘數的最大位數均為2048位長的模乘運算所需平均時間約為5 . 239ms ,在進行一次底數和指數的最大位數均為2048位長的模指數運算所需的平均時間約為4290 . 559ms 。
  15. This article provides a brief description of rsa public key cryptography, an analysis and compare of all kinds of present existed modular exponentiation in rsa public key cryptography, a colligation of the fastest accelerating software algorithm - vlnw sliding window methods and hardware mapping fast montgomery modular multiplication algorithm that can improve the implementary efficiency of rsa public key cryptography for achieving the novel algorithm - mnexp algorithm

    本文簡單介紹了rsa公鑰密碼體制,分析比較rsa公鑰密碼中已有的模冪運算方法,將得到的最快軟體加速演算法vlnw滑動窗口法和硬體映射最快的montgomery模乘演算法綜合,得到改進后的mnexp演算法能有效提高rsa公鑰密碼的實現效率。橢圓曲線密碼系統被認為可以替代rsa演算法的一種公鑰密碼體制。
  16. The modular exponentiation, are the core and the most time consuming steps in public key crytographic schemes such as ras and elgammal schemes, in those the security is guaranteed by the assumption that the integers is large enough, say 1024 or 2048 bits long

    在rsa和elgammal等一類公鑰密碼體制中,計算形如的運算是最耗時的運算步驟,大整數模運算是其核心運算。提高這種運算的運算速度方法分為加快模乘法的運算速度和減少模乘法的次數兩個方面。
  17. Furthermore, the scheme is improved, and it is shown that the improved scheme is more secure than the original by analyzing the security of the improved scheme, and has only one exponentiation modulo p and two hash - function evaluations for verification

    此外,對原方案進行了改進,通過對改進方案的安全性分析得出結論;改進方案此原方案更安全,並且消息恢復過程只需要計算一次大數模冪乘和兩次單向函數。
  18. Asymmetric - key cryptography, which we will discuss in chapter 10, is based on some topics in number theory, including theories related to primes, factorization of composites into primes, modular exponentiation and logarithm, quadratic residues, and the chinese remainder theorem

    我們將在第十章中討論非對稱密鑰密碼學,非對稱密鑰密碼學基於一些數論的論題,這些論題與素數、把復合數分解為素數的因數分解、模指數與模對數、二次剩餘和中國剩餘定理有關。
  19. Read and analysis for the advanced research papers : fast exponentiation computation, multisignature, proxy signature, threshold signature, group signature, identification authentications, visitor control, multisecret sharing

    閱讀並討論專題論文:快速指數運算、多重簽名、代理簽名、門限簽名、群簽名、身份認證、訪問控制、 (多)秘密共享。
  20. This thesis, focused on the large integer modular computations, studies the two ways to reduce the time consumed by modular exponentiation - - - algorithms for fast modular multiplication and algorithms for computing powers with the least numbers of modular multiplication

    本文對數據加密體制用到的大整數模運算進行研究。我們的工作分為兩個部分:一部分是對大整數快速模運算演算法的分析、研究;另一部分是大整數快速模運算演算法的實現。
分享友人