Results 41 to 50 of about 932 (141)

Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform

open access: yes网络与信息安全学报, 2022
With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic ...
Ganqin LIU   +4 more
doaj   +3 more sources

More Generalized Mersenne Numbers [PDF]

open access: yes, 2004
In 1999, Jerome Solinas introduced families of moduli called the generalized Mersenne numbers. The generalized Mersenne numbers are expressed in a polynomial form, p = f(t), where t is a power of 2. It is shown that such p’s lead to fast modular reduction methods which use only a few integer additions and subtractions.
Jaewook Chung, Anwar Hasan
openaire   +1 more source

Leading Digits of Mersenne Numbers [PDF]

open access: yesExperimental Mathematics, 2019
It has long been known that sequences such as the powers of $2$ and the factorials satisfy Benford's Law; that is, leading digits in these sequences occur with frequencies given by $P(d)=\log_{10}(1+1/d)$, $d=1,2,\dots,9$. In this paper, we consider the leading digits of the Mersenne numbers $M_n=2^{p_n}-1$, where $p_n$ is the $n$-th prime. In light of
Cai, Zhaodong   +4 more
openaire   +2 more sources

On generalized Mersenne hybrid numbers

open access: yesAnnales Universitatis Mariae Curie-Sklodowska, sectio A – Mathematica, 2020
The hybrid numbers are generalization of complex, hyperbolic and dual numbers. In this paper we consider  a special kind of hybrid numbers, namely the Mersenne hybrid numbers and we give some of their properties.
Szynal-Liana, Anetta, Włoch, Iwona
openaire   +2 more sources

A Study of Determinants and Inverses for Periodic Tridiagonal Toeplitz Matrices with Perturbed Corners Involving Mersenne Numbers

open access: yesMathematics, 2019
In this paper, we study periodic tridiagonal Toeplitz matrices with perturbed corners. By using some matrix transformations, the Schur complement and matrix decompositions techniques, as well as the Sherman-Morrison-Woodbury formula, we derive explicit ...
Yunlan Wei   +3 more
doaj   +1 more source

Keystroke Dynamics-Based Authentication Using Unique Keypad

open access: yesSensors, 2021
Authentication methods using personal identification number (PIN) and unlock patterns are widely used in smartphone user authentication. However, these authentication methods are vulnerable to shoulder-surfing attacks, and PIN authentication, in ...
Maro Choi   +3 more
doaj   +1 more source

An Ultra-light PRNG Passing Strict Randomness Tests and Suitable for Low Cost Tags

open access: yesAdvances in Electrical and Computer Engineering, 2016
A pseudo-random number generator for low-cost RFID tags is presented. The scheme is simple, sequential and secure, yet has a high performance. Despite its lowest hardware complexity, our proposal represents a better alternative than previous proposals ...
OZCANHAN, M. H.   +2 more
doaj   +1 more source

Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking.
Gaëtan Cassiers   +4 more
doaj   +1 more source

Note on a Mersenne number [PDF]

open access: yesBulletin of the American Mathematical Society, 1934
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

The emergence of the Mersenne Star: a new geometry of prime numbers bridging physics and artificial general intelligence

open access: yesArab Journal of Basic and Applied Sciences
This paper introduces a new key geometric way to understand Mersenne prime numbers. It discovers a shape called the Mersenne Star, which appears naturally from a special sequence named the Quanta Prime Sequence (QPS).
Moustafa Ibrahim
doaj   +1 more source

Home - About - Disclaimer - Privacy