Typical Applications of Matrices in Cryptography and Their Theoretical Support for Efficient and Green Intelligent Computing

Authors

  • Siyu Yang
  • Meimei Zhang
  • Yiting Li

DOI:

https://doi.org/10.54097/aeb1yg29

Keywords:

Matrix, Artificial Intelligence (AI), Cryptography

Abstract

As the core content of linear algebra, matrices provide basic mathematical support for many algorithms in artificial intelligence (AI). The characteristic of efficient computation in matrix theory facilitates the dual improvement of the performance and energy efficiency of AI algorithms. This paper focuses on the typical applications of matrices in cryptography, aiming to provide theoretical support for constructing an efficient and green intelligent computing path. Research shows that as a bridge connecting mathematical theory and technological applications, matrices not only occupy a fundamental position in the development of AI but also possess extensive research value and profound social significance.

Downloads

Download data is not yet available.

References

[1] Zhang Mengran. AI creates efficient and accurate mathematical algorithms for the first time. Computer and Network, 2022.

[2] Ilya Solovychik, Ilya Liubomirsky. Matrix multiplication calculation device and AI accelerator device for AI accelerator integrated circuits: CN202322826485.7 [P]. CN221960554U [2025-12-04]. 2025.

[3] Diao Wenqi. Research and Implementation of Matrix Computing Architecture Based on Delay Constrained Asynchronous Circuit. Lanzhou University, 2021.

[4] Shen Jian. Developing specialized directional sports skills through matrix games. Chinese School Physical Education, 2024, 43(05): 35-36.

[5] Kang jian. GTX860M Extreme Matrix Gaming Machine Review. Computer and Network, 2014, 000 (017): 24-26.

[6] Li Chen. Dong Shijie. 5G empowers password to promote the safe and high-quality development of traditional manufacturing industry. China Cement, 2023.

[7] Song Chen. Master's thesis on privacy protection in deep learning model inference based on cryptography. Guangxi Univesity, 2024.

[8] Wang Weijin, Yuan Jixue A database password encoding algorithm based on Hill cipher idea. Computer and Modernization, 2005.

Downloads

Published

27-01-2026

Issue

Section

Articles

How to Cite

Yang, S., Zhang, M., & Li, Y. (2026). Typical Applications of Matrices in Cryptography and Their Theoretical Support for Efficient and Green Intelligent Computing. Frontiers in Computing and Intelligent Systems, 15(1), 41-43. https://doi.org/10.54097/aeb1yg29