Elliptic function

Results: 206



#Item
71XTR / Function / Cryptographic protocols / Mathematics / Elliptic curve Diffie–Hellman / Public-key cryptography

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
72Elliptic integral / Differential form / Meijer G-function

CENTRE FOR STOCHASTIC GEOMETRY AND ADVANCED BIOIMAGING Eva B. Vedel Jensen and Allan Rasmusson MISCELLANEA

Add to Reading List

Source URL: csgb.dk

Language: English - Date: 2014-02-25 08:02:46
73Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / Factorial / Blum Blum Shub / RBG / One-way function / Mathematics / Pseudorandom number generators / Cryptography

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
74Analytic geometry / Functions and mappings / Function / Curve / Exponential function / Midpoint circle algorithm / Elliptic curve / Mathematics / Geometry / Mathematical analysis

THE UNIVERSITY OF AKRON Mathematics and Computer Science Lesson 9: Functions (cont.) & First Degree Curves Directory bI amrDaPS Re

Add to Reading List

Source URL: math.uakron.edu

Language: English - Date: 2002-04-05 21:58:08
75Mathematics / Elliptic functions / Modular forms / Symbol / Orbifold / Mathematical analysis / Calculus / Continuous function

NORGES TEKNISK-NATURVITENSKAPELIGE UNIVERSITET B-series and order conditions for exponential integrators by H˚

Add to Reading List

Source URL: www.pvv.ntnu.no

Language: English - Date: 2004-08-31 11:52:36
76Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
77Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
78Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
79Group theory / Galois theory / Equations / Polynomials / Elliptic curve / Field extension / Quintic function / Field / Isogeny / Abstract algebra / Algebra / Field theory

On metacyclic extensions Masanari Kida University of Electro-Communications September 9, 2008

Add to Reading List

Source URL: mathweb.e-one.uec.ac.jp

Language: English - Date: 2011-07-06 20:43:54
80Kummer theory / Polynomial / Quintic function / Field / Splitting field / Elliptic curve / Class field theory / Abstract algebra / Algebra / Field theory

Kummer theory for D5-extensions

Add to Reading List

Source URL: matha.e-one.uec.ac.jp

Language: English - Date: 2011-07-06 20:43:50
UPDATE