Christopher Wolf

Results: 50



#Item
21Post-quantum cryptography / Finite fields / Hidden Field Equations / Affine geometry / Affine transformation / Parity of a permutation / Abstract algebra / Geometry / Mathematics

Equivalent Keys in HFE, C∗ , and variations Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven.ac.be or chris@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-09 08:01:38
22Hidden Field Equations / Unbalanced Oil and Vinegar / Affine transformation / Quadratic polynomial / Vector space / Polynomial / Multivariate cryptography / Algebraic geometry / Algebra / Mathematics / Post-quantum cryptography

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-28 03:37:27
23Computer algebra / Numerical linear algebra / Finite fields / Algebraic geometry / Error detection and correction / Gröbner basis / Matrix / Hidden Field Equations / Gaussian elimination / Algebra / Mathematics / Abstract algebra

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-14 05:32:54
24Privacy / Internet vigilantism / Internet privacy / Christopher Wolf / Rumor / Freedom of speech / Ethics / Daniel J. Solove / Year of birth missing

The Future of Reputation This page intentionally left blank The Future of Reputation

Add to Reading List

Source URL: docs.law.gwu.edu

Language: English - Date: 2012-11-12 16:03:18
25Data synchronization / Parallel computing / Concurrent computing / Replication / Backup / Algorithm / Computer cluster / Scheduling / Fault-tolerant system / Computing / Fault-tolerant computer systems / Systems engineering

Middleware for Resource-Aware Deployment and Configuration of Fault-Tolerant Real-time Systems Jaiganesh Balasubramanian† , Aniruddha Gokhale† , Abhishek Dubey† , Friedhelm Wolf† , Chenyang Lu‡ , Christopher Gi

Add to Reading List

Source URL: www.isis.vanderbilt.edu

Language: English - Date: 2009-10-16 18:01:16
26Christopher Wolf / Hate group / Hate speech / Internet / Social philosophy / Human behavior / Ethics / Hate crime / Anti-Defamation League

Table of content Alexandra Beyersdörfer: Preface Stefan Glaser: Acknowledgements Ulrich Dovermann: Opening Remarks Christopher Wolf: Introduction - Hate Speech on the Internet I

Add to Reading List

Source URL: www.theewc.org

Language: English - Date: 2014-10-03 08:19:05
27Data privacy / National security / Security breach notification laws / Information security / Health Insurance Portability and Accountability Act / Identity theft / Personally identifiable information / Physical security / Data breach / Security / Computer security / Data security

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganl

Add to Reading List

Source URL: www.americanbar.org

Language: English - Date: 2014-02-27 09:33:50
28Southwestern Law School / Privacy / Computer law / Internet privacy / Christopher Wolf / Legal aspects of computing / Information privacy / Facebook / Ethics / Computing / World Wide Web

Taking full advantage of its location at the heart of the global entertainment industry, Southwestern Law School’s Donald E. Biederman Entertainment and Media Law Institute offers the most comprehensive entertainment a

Add to Reading List

Source URL: www.swlaw.edu

Language: English - Date: 2013-02-11 19:08:04
29Internet privacy / Daniel J. Solove / Christopher Wolf / Future of Privacy Forum / Legal aspects of computing / Privacy / Ethics / Information privacy

New Year, New Challenges: Preparing Your Campus for Data Privacy and Security Issues in the Year Ahead

Add to Reading List

Source URL: net.educause.edu

Language: English - Date: 2014-09-08 13:05:06
30Privacy / Identity management / Law / Internet privacy / Southwestern Law School / Christopher Wolf / Information privacy / Legal aspects of computing / Facebook / Ethics / Computing / World Wide Web

Schedule 9:00 - 9:45 a.m. Friday, February 22, 2013 Check-in and Continental Breakfast

Add to Reading List

Source URL: www.swlaw.edu

Language: English - Date: 2012-12-19 21:44:13
UPDATE