منابع مشابه
High Speed Modulo Calculation Algorithm with Radix-2k SD Number
In RSA Cryptograms, many modulo calculations are used, but modulo calculation is based on many subtractions and it takes long time to calculate. In this article, we explain about a new modulo calculation algorithm using table. And we proof that upper 3 digits of Radix-2k SD numbers is enough to specify the answer. In the first section, we prepared some useful theorems for operations of Radix-2k...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملAlgorithm for Modulo Addition KHALED
When designing elliptic-function filters there is usually some margin in performance to be distributed over the defining parameters. A recent paper offered some comparatively complicated formulas for use in this stage of the design. However, a simpler method, originally due to Darlington, is available and i s described briefly. passband ripple is again given by (2). ‘The cd function is the same...
متن کاملInversion Modulo Zero-Dimensional Regular Chains
We consider the questions of inversion modulo a regular chain in dimension zero and of matrix inversion modulo such a regular chain. We show that a well-known idea, Leverrier’s algorithm, yields new results for these questions.
متن کاملInverse modeling of HEM data using a new inversion algorithm
Helicopter-borne frequency-domain electromagnetic (HEM) surveys are used extensively for mineral and groundwater exploration and a number of environmental investigations. To have a meaningful interpretation of the measured multi- frequency HEM data, in addition to the resistivity maps which are provided in each frequency or for some particular depth levels, it is a necessity ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography
سال: 2018
ISSN: 2410-387X
DOI: 10.3390/cryptography2030023