Abstract: With the development of information security and communication technology, SM2 algorithm has been widely used in security chip, secure communication and other fields. Point multiplication is ...
Abstract: The growing disparity between processor and memory performance poses significant limits on system performance and energy efficiency. To address this widely investigated problem, modern ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results