Computing Hypercrossed Complex Pairings in Digital Images

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pairings in Trusted Computing

Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathemati...

متن کامل

On Computing Products of Pairings

In many pairing-based protocols often the evaluation of the product of many pairing evaluations is required. In this paper we consider methods to compute such products efficiently. Focusing on pairingfriendly fields in particular, we evaluate methods for the Weil, Tate and Ate pairing algorithms for ordinary elliptic curves at various security levels. Our operation counts indicate that the mini...

متن کامل

Computing pairings using x -coordinates only

To reduce bandwidth in elliptic curve cryptography one can transmit only x-coordinates of points (or x-coordinates together with an extra bit). For further computation using the points one can either recover the y-coordinates by taking square roots or one can use point multiplication formulae which use x-coordinates only. We consider how to efficiently use point compression in pairing-based cry...

متن کامل

Temperature Mapping Using Ultrasound Digital Images

Introduction:  The  success  of  hyperthermia  depends  on  the  accuracy  of  the  temperature  monitoring in the tumor and the surrounding normal tissue. In this study, the temperature changes  were determined by computing the speckle displacement in the ultrasound digital images. Speckle  tracking algorithm was used to compute the displacement.  Materials and Methods: The experiment was perf...

متن کامل

Structured investigation of digital incidents in complex computing environments

Critics, unimpressed by the rigor of the forensic digital examination process, have taken the position that forensic digital analysis is, more rightly, simply little more than ad hoc data collection and analysis. The reality is that forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology. Struggling to keep pace with...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Abstract and Applied Analysis

سال: 2013

ISSN: 1085-3375,1687-0409

DOI: 10.1155/2013/675373