antilogarithm

(redirected from exponentiation)
Also found in: Dictionary, Thesaurus, Legal, Acronyms, Encyclopedia, Wikipedia.

antilogarithm

the number whose logarithm is the number in question.
Mentioned in ?
References in periodicals archive ?
This modular exponentiation problem can be described as follows.
We compare operations which are expensive from the computational point of view--pairing operations, scalar scalar multiplications and exponentiation.
Because the computation of modular exponentiation is burdensome for a smart card, the proposed scheme makes the server execute the operation in order to lessen the troublesome implementation for smart card and to speed up the computation.
The modular exponentiation is a common operation for scrambling and is used by several public-key cryptosystems, such Defile and Hellman [8], [9] and the Rivest, Shamir and Adleman encryption schemes [34], as encryption/decryption method.
Modular exponentiation is a complicated operator and plays a determinate role in a signature scheme.
Packetized SSL technology allows Andes to deliver not only the industry's highest SSL connection per second performance, but also the best bulk encryption throughput, the most active session and the fastest RSA exponentiation performance.
With twin exponentiation units and a PowerPC 401 controller, FastMAP can perform a reference 1024-bit RSA private key operation in under five milliseconds.
The entire area of authentication and digital property rights management could be accelerated by Andes' high-speed RSA exponentiation chip.
The attributes that can be negotiated such as the authentication or encryption algorithm to use, Oakley group to use for Diffie-Hellman exponentiation, the life type and life time of the security associations etc.
6 um CMOS process, Philips Semiconductors has significantly increased the speed of the chip's FAMEX (Fast Accelerator for Modular Exponentiation - Extended) crypto co-processor.
By using SNC, the entire authentication and encryption process is handled within hardware, including random number generation, exponentiation, secure hashing, encryption key pair generation, and Diffie-Hellman number generation.
The Computational costs depend on the Number of exponentiations.