Exponentiation

Results: 915



#Item
1Cryptography / Exponentials / Cross-platform software / Cryptographic software / GNU Privacy Guard / OpenPGP / Privacy software / RSA / Exponentiation by squaring / Modular exponentiation / ElGamal encryption / Chosen-ciphertext attack

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 18:24:31
2

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:26
    3

    Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

    Add to Reading List

    Source URL: www.bmoeller.de

    Language: English - Date: 2008-05-19 15:51:37
      4

      Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

      Add to Reading List

      Source URL: www.cis.upenn.edu

      - Date: 2017-08-28 18:24:31
        5

        EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

        Add to Reading List

        Source URL: files.vipulnaik.com

        - Date: 2016-08-13 11:33:29
          6Mathematics / Game theory / Leisure / Non-cooperative games / Binary operations / Blotto / Zero-sum game / Matrix / Minimax / Addition / Exponentiation / Game

          C OLONEL B LOTTO : S EARCHING FOR PATTERNS IN A G AME OF A LLOCATION By Jeremiah Jones

          Add to Reading List

          Source URL: www2.stetson.edu

          Language: English - Date: 2015-04-24 19:12:54
          7Software engineering / Computing / Computer programming / Subroutines / Data types / Anonymous function / Functional programming / Lambda calculus / Exponentiation / ATS / Array data type / Parameter

          The Julia Express Bogumił Kaminski ´ January 4, 2015 Contents

          Add to Reading List

          Source URL: bogumilkaminski.pl

          Language: English - Date: 2015-01-04 14:18:51
          8Algebra / Mathematics / Mathematical analysis / Fourier analysis / Linear algebra / Binary operations / Basis function / Numerical analysis / Numerical linear algebra / Exponentiation

          Time Series Lesson 9 Grant Foster Representing Data

          Add to Reading List

          Source URL: teachingfuturescientists.files.wordpress.com

          Language: English - Date: 2016-06-30 12:56:46
          9Mathematics / Mathematical analysis / Special functions / Logarithms / Mathematical notation / Binary operations / Mental calculation / Common logarithm / Natural logarithm / Pi / Big O notation / Exponentiation

          The Practical Use of the Bemer Method for Exponentials Update Version: September 5, 2006 Ron Doerfler (http://www.myreckonings.com) In Chapter 4 of my book, Dead Reckoning: Calculating Without Instruments, a method is gi

          Add to Reading List

          Source URL: www.myreckonings.com

          Language: English - Date: 2006-09-06 21:58:02
          10Mathematics / Algebra / Matrices / Exponentials / Combinatorics / Circulant matrix / Numerical linear algebra / Exponentiation / Circulant graph / Factorial / Matrix / LindemannWeierstrass theorem

          Distribution of the exponents of primitive circulant matrices in the first four boxes of Zn. M.I. Bueno Mathematics Department and College of Creative Studies, University of California Santa Barbara ∗,

          Add to Reading List

          Source URL: math.ucsb.edu

          Language: English - Date: 2011-11-04 16:28:12
          UPDATE