Efficient and verifiable algorithms for secure outsourcing of cryptographic computations.
Mehmet Sabir KirazOsmanbey UzunkolPublished in: Int. J. Inf. Sec. (2016)
Keyphrases
- computationally complex
- computationally efficient
- highly efficient
- efficient implementation
- theoretical analysis
- computationally expensive
- information systems
- computationally intensive
- security protocols
- computational cost
- optimization problems
- significant improvement
- learning algorithm
- computational complexity
- highly scalable
- parallel architectures
- cryptographic protocols
- computationally demanding
- matrix multiplication