Pipelining of modular multiplication operations for efficient trust computation in decentralized cyber-physical environments
Abstract
Full Text:
PDFReferences
Petrenko V. I. et al. Method of trusted agent interaction in a decentralized cyber-physical environment based on distributed ledger technology // Caspian Journal: Management and High Technologies. — 2023. — No. 3 (63). — P. 115.
Roig P. J. [et al.]. Modeling an Edge Computing Arithmetic Framework for IoT Environments // Sensors 2022, Vol. 22, Page 1084. 2022. No. 3 (22). C. 1084.
Samofalov K.G., Lutskiy G.M. Fundamentals of the theory of multilevel pipelined computing systems. — M.: Radio i svyaz, 1989. — 272p.
Orton G., Peppard L., Tavares S. A design of a fast pipelined modular multiplier based on a diminished-radix algorithm // Journal of Cryptology. 1993. No. 4 (6). P. 183–208.
Ma C. [et al.]. Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning // Proceedings of the IEEE. 2023. No. 9 (111). P. 1097–1132.
Page J., Zaslavsky A., Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios // Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation. 2004. (32). P. 17–25.
Zikratov I. A., Zikratova T. V., Lebedev I. S. Trust model of information security of multi-agent robotic systems with decentralized control // Scientific and technical bulletin of information technologies, mechanics and optics. - 2014. - No. 2 (90). - P. 47-52.
Zikratov I. A. [et al.]. Construction of a model of trust and reputation for objects of multi-agent robotic systems with decentralized control // Scientific and Technical Bulletin of Information Technologies, Mechanics and Optics. - 2014. - No. 3 (91). - P. 30-38
Zikratov I. A. [et al.]. Security model of mobile multi-agent robotic systems with collective control // Scientific and technical bulletin of information technologies, mechanics and optics. - 2017. - Vol. 17, No. 3. - P. 439–449. - DOI: 10.17586/2226-1494-2017-17-3-439-449.
Amini M. R., Baidas M. W. Availability-Reliability-Stability Trade-Offs in Ultra-Reliable Energy-Harvesting Cognitive Radio IoT Networks // IEEE Access. 2020. (8). C. 82890–82916.
Ullah S. [et al.]. Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey // Computer Science Review. 2023. (47). C. 100530.
Singh S., Maakar S. K., Kumar S. A Performance Analysis of DES and RSA Cryptography 2013.
Lysyanskaya A. Security analysis of RSA-BSSA 2023.P. 251–280.
Naser S. M. Cryptography: From the ancient history to now, it’s applications and a new complete numerical model // International journal of mathematics and statistics studies. 2021. No. 3 (9). P. 11–30.
Fryer D. [et al.]. Checking the integrity of transactional mechanisms // ACM Transactions on Storage. 2014. No. 4 (10).
Bohm H., Distler T., Wagemann P. TinyBFT: Byzantine Fault-Tolerant Replication for Highly Resource-Constrained Embedded Systems // 2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS). 2024. P. 225–238.
Wang Y., Zhong M., Cheng T. Research on PBFT consensus algorithm for grouping based on feature trust // Scientific Reports 2022 12:1. 2022. No. 1 (12). P. 1–12.
Ali A. [et al.]. Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain // Sensors 2023, Vol. 23, Page 7162. 2023. No. 16 (23). P. 7162.
Chinnam R. K. [et al.]. Enhancing IoT Security and Efficiency with DPOS Enabled Blockchain and IPFS Integration // 2024 2nd International Conference Computational and Characterization Techniques in Engineering and Sciences, IC3TES 2024. 2024.
Amoussou-Guenou Y. [et al.]. Dissecting Tendermint // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2019. (11704 LNCS). P. 166–182.
Gennaro R., Krawczyk H., Rabin T. RSA-based undeniable signatures // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1997. (1294). P. 132–149.
Gupta N., Jain A. K. RSA Based Consensus Algorithm for Lightweight Private Blockchain Network // ITM Web of Conferences. 2023. (54). P. 03003.
Milanov E. [et al.]. The RSA algorithm // RSA laboratories. 2009.No. 2 (42). P. 1–11.
Pavan Kumar C. H., Sivani K. Implementation of efficient parallel prefix adders for residue number system // International Journal of Computing and Digital Systems. 2015. No. 4 (4). P. 295–300.
Ma C. [et al.]. Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning // Proceedings of the IEEE. 2023. No. 9 (111). P. 1097–1132.
Petrenko V. I. Pipelined modulo multiplier // Patent for invention 2797164 C1, Published 07/19/2021 Bulletin No. 20.
Petrenko V. I., Sutormin M. P., Puiko D. D. Pipelined modulo multiplier // Patent for invention 2797164 C1, Published 07/19/2021 Bulletin No. 20.
Petrenko V. I. Modulo multiplier // Patent for invention 2751802 C1, Published 07/19/2021 Bulletin No. 20.
Alzubi J. A. Blockchain-based Lamport Merkle digital signature: authentication tool in IoT healthcare // Computer Communications. 2021. (170).P. 200–208.
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность ИБП для ЦОД СНЭ
ISSN: 2307-8162