Discrete logarithm

Results: 130



#Item
71Disorder Inequality: A Combinatorial Approach to Nearest Neighbor Search Navin Goyal ∗ College of Computing Georgia Tech

Disorder Inequality: A Combinatorial Approach to Nearest Neighbor Search Navin Goyal ∗ College of Computing Georgia Tech

Add to Reading List

Source URL: yury.name

Language: English - Date: 2008-11-06 21:13:22
72CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
73Efficient Belief Propagation for Early Vision Pedro F. Felzenszwalb and Daniel P. Huttenlocher Department of Computer Science, Cornell University {pff,dph}@cs.cornell.edu  Abstract

Efficient Belief Propagation for Early Vision Pedro F. Felzenszwalb and Daniel P. Huttenlocher Department of Computer Science, Cornell University {pff,dph}@cs.cornell.edu Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2004-08-10 08:58:52
74Reverse Engineering of Strong CryptoSignatures Schemes

Reverse Engineering of Strong CryptoSignatures Schemes

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:56
75CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-05-13 22:32:41
76CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-05 20:38:47
77CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
78Kleptography: Using Cryptography Against Cryptography Adam Young* and

Kleptography: Using Cryptography Against Cryptography Adam Young* and

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-09-12 07:28:33
79Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields Jean-Charles Faug`ere1 Ludovic Perret1 Gu´ena¨el Renault1

Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields Jean-Charles Faug`ere1 Ludovic Perret1 Gu´ena¨el Renault1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:14:48
80Cover and Decomposition Index Calculus on Elliptic Curves made practical Application to a previously unreachable curve over Fp6 Vanessa VITSE – Antoine JOUX Universit´

Cover and Decomposition Index Calculus on Elliptic Curves made practical Application to a previously unreachable curve over Fp6 Vanessa VITSE – Antoine JOUX Universit´

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20