Results 41 to 50 of about 932 (141)
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic ...
Ganqin LIU +4 more
doaj +3 more sources
More Generalized Mersenne Numbers [PDF]
In 1999, Jerome Solinas introduced families of moduli called the generalized Mersenne numbers. The generalized Mersenne numbers are expressed in a polynomial form, p = f(t), where t is a power of 2. It is shown that such p’s lead to fast modular reduction methods which use only a few integer additions and subtractions.
Jaewook Chung, Anwar Hasan
openaire +1 more source
Leading Digits of Mersenne Numbers [PDF]
It has long been known that sequences such as the powers of $2$ and the factorials satisfy Benford's Law; that is, leading digits in these sequences occur with frequencies given by $P(d)=\log_{10}(1+1/d)$, $d=1,2,\dots,9$. In this paper, we consider the leading digits of the Mersenne numbers $M_n=2^{p_n}-1$, where $p_n$ is the $n$-th prime. In light of
Cai, Zhaodong +4 more
openaire +2 more sources
On generalized Mersenne hybrid numbers
The hybrid numbers are generalization of complex, hyperbolic and dual numbers. In this paper we consider a special kind of hybrid numbers, namely the Mersenne hybrid numbers and we give some of their properties.
Szynal-Liana, Anetta, Włoch, Iwona
openaire +2 more sources
In this paper, we study periodic tridiagonal Toeplitz matrices with perturbed corners. By using some matrix transformations, the Schur complement and matrix decompositions techniques, as well as the Sherman-Morrison-Woodbury formula, we derive explicit ...
Yunlan Wei +3 more
doaj +1 more source
Keystroke Dynamics-Based Authentication Using Unique Keypad
Authentication methods using personal identification number (PIN) and unlock patterns are widely used in smartphone user authentication. However, these authentication methods are vulnerable to shoulder-surfing attacks, and PIN authentication, in ...
Maro Choi +3 more
doaj +1 more source
An Ultra-light PRNG Passing Strict Randomness Tests and Suitable for Low Cost Tags
A pseudo-random number generator for low-cost RFID tags is presented. The scheme is simple, sequential and secure, yet has a high performance. Despite its lowest hardware complexity, our proposal represents a better alternative than previous proposals ...
OZCANHAN, M. H. +2 more
doaj +1 more source
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking.
Gaëtan Cassiers +4 more
doaj +1 more source
Note on a Mersenne number [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
This paper introduces a new key geometric way to understand Mersenne prime numbers. It discovers a shape called the Mersenne Star, which appears naturally from a special sequence named the Quanta Prime Sequence (QPS).
Moustafa Ibrahim
doaj +1 more source

