Abstract: With the development of information security and communication technology, SM2 algorithm has been widely used in security chip, secure communication and other fields. Point multiplication is ...
Abstract: The growing disparity between processor and memory performance poses significant limits on system performance and energy efficiency. To address this widely investigated problem, modern ...