就爱字典>英语词典>exponentiation翻译和用法

exponentiation

n.  取幂,求幂,乘方

计算机

英英释义

noun

  • the process of raising a quantity to some assigned power
      Synonym:involution

    双语例句

    • During the period of transforming, RSA should perform the modular exponentiation multiplication algorithm of large number.
      在变换过程中,RSA必需经历大数的模幂乘运算。
    • Modular exponentiation of larger-number has universal application in cryptography, and it is the base operation in most public-key cryptography algorithms.
      大数模幂在密码学领域有广泛的应用,它是公钥密码的基础。
    • A concrete instance is presented in which the S-Box iteration is much less time-consuming than modular exponentiation.
      给出一个实例,在该实例中S盒的迭代远远快于模指数计算。
    • This paper introduced a method called "sliding-window" used in multiple-precision integer exponentiation arithmetic, and studied its application combined with Montgomery reduction, and how to calculate the "window size" related to the bits of the multiple-precision integer.
      介绍了多精度整数求幂运算中的“滑动窗口”算法,并结合Montgomery约简算法,对“滑动窗口”算法进行了应用研究,分析了根据多精度整数的位数来确定相应的窗口大小。
    • Implementation of SPA Resistant RSA Exponentiation Algorithm
      抵御简单功耗分析的RSA模幂算法实现
    • On estimation of optimal window size in m_ary algorithm in modular exponentiation and point multiplication;
      定义了大窗口和小窗口,指出经典蚁群算法实质上是大窗口蚁窗算法。
    • Notice how here the fact that we added exponentiation to the system has been done in effectively six lines of code with zero surface change to the rest of the Calc class.
      注意,这里我们只使用6行代码就有效地向系统添加了求幂运算,同时没有对Calc类进行任何表面更改。
    • Based on analyses of self-randomized modular exponentiation algorithm, a new side-channel atomic strict self-randomized modular exponentiation algorithm is proposed in which a BBS random number generator and the side-channel atomic technology are applied to improve the original algorithm.
      通过对自随机化模幂算法的分析,提出将BBS随机数发生器和侧信道原子化技术应用于改进的算法中,得到侧信道原子化的严格自随机化模幂算法。
    • Read and analysis for the advanced research papers: fast exponentiation computation, multisignature, proxy signature, threshold signature, group signature, identification authentications, visitor control, Multisecret sharing.
      阅读并讨论专题论文:快速指数运算、多重签名、代理签名、门限签名、群签名、身份认证、访问控制、(多)秘密共享。
    • If we use exponentiation to encrypt or decrypt, the adversary can use logarithm to attack.
      如果我们运用求幂运算来加密和解密,对手就可以运用对数进行攻击。