First Page | Document Content | |
---|---|---|
Date: 2014-08-03 16:15:38Cryptography Elliptic curve cryptography Public-key cryptography Pairing-based cryptography Finite fields Group theory Hyperelliptic curve cryptography Tate pairing DiffieHellman key exchange BonehLynnShacham Elliptic curve Abelian variety | Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1Add to Reading ListSource URL: www.normalesup.orgDownload Document from Source WebsiteFile Size: 810,58 KBShare Document on Facebook |
ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 1: Group Theory 1DocID: 1xVrN - View Document | |
Group Henzinger Software Systems Theory Systems Biology Group membersDocID: 1xV3x - View Document | |
Lecture notes: Basic group and representation theory Thomas Willwacher February 27, 2014 2DocID: 1xUQE - View Document | |
SPNs: Network Reconstruction Theory and Speedup Using Neural Networks Balaji Prabhakar and Mendel Rosenblum Self-‐Programming Networks Research Group StanfDocID: 1xTIn - View Document | |
XFindBugs: eXtended FindBugs for AspectJ Haihao Shen, Sai Zhang, Jianjun Zhao, Jianhong Fang, Shiyuan Yao Software Theory and Practice Group (STAP) Shanghai Jiao Tong University, China A codeDocID: 1xTFA - View Document |