1) nilpotent operation
幂零运算
2) nilpotent operator
幂零算子
1.
In this paper, we shall obtain some sufficient and necessary conditions for the second degree Putnam Fuglede theorem to be true under the perturbation of the nilpotent operators and for some non normal operators.
本文给出了在幂零算子扰动下及在一些非正常算子时的二次PF定
3) Modular exponentiation
模幂运算
1.
NSP algorithm for modular exponentiation;
模幂运算的并行算法NSP
2.
In this paper,a new modular exponentiation algorithm named window NAF algorithm is proposed.
将椭圆曲线的定点标量乘的窗口NAF方法应用在模幂运算中,通过采用预处理技术,与SMM算法进行组合得到一种新的求模幂乘算法-窗口NAF方法。
4) modular exponentiations
模幂运算
1.
This thesis firstly introduces the basic theory of timing attack and the discription of the related algorithms, and then taking the modular exponentiations for example, emulates the attack process, finally analysises the advantages, several prob- lems waiting for further study and the trend of timing attack.
本文从定时攻击的概念及原理出发,继而以模幂运算作为加密算法为例,模拟了对该计算进行破解的过程,最后分析了定时攻击的优点、存在的问题以及发展趋势。
5) modular multiplication
模幂运算
1.
The performance of RSA algorithm implementation has direct relation with the efficiency of modular multiplication implementation.
RSA算法的执行效率与模幂运算的实现效率有着直接的关系。
6) power exponentiation
乘幂运算
补充资料:幂零Lie代数
幂零Lie代数
Lie algebra, nilpotent
幂零lie代数【liealgebI’a.浦训t即t;瓜朋~。代Hm明盯e6Pal 域k上满足下列等价条件之一的代数(司罗bla)g: l)有g的理想的有限降链{9.}。“、。,使得g。=g,g。={o},且对o簇i
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条