Finite fields

Results: 995



#Item
181515  CORRESPONDENCE On the Complexity DILIP

515 CORRESPONDENCE On the Complexity DILIP

Add to Reading List

Source URL: www.ifp.illinois.edu

Language: English - Date: 2003-07-08 17:06:33
182ON THE SIZE OF KAKEYA SETS IN FINITE FIELDS ZEEV DVIR F  F

ON THE SIZE OF KAKEYA SETS IN FINITE FIELDS ZEEV DVIR F F

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2008-11-24 05:56:46
    183U NE ATTAQUE ´ MA POLYNOMIALE DU SCH E DE  M C E LIECE BAS E´ SUR LES

    U NE ATTAQUE ´ MA POLYNOMIALE DU SCH E DE M C E LIECE BAS E´ SUR LES

    Add to Reading List

    Source URL: caramba.loria.fr

    Language: English - Date: 2016-06-13 15:37:33
    184First Joint Meeting Brazil Italy of Mathematics Special Session: Algebraic Geometry over Finite Fields and its Applications to Coding Theory Rio de Janeiro, August 29 - September 02, 2016 Title: Two-point AG codes on the

    First Joint Meeting Brazil Italy of Mathematics Special Session: Algebraic Geometry over Finite Fields and its Applications to Coding Theory Rio de Janeiro, August 29 - September 02, 2016 Title: Two-point AG codes on the

    Add to Reading List

    Source URL: www.sbm.org.br

    - Date: 2016-03-04 07:02:08
      185Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

      Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

      Add to Reading List

      Source URL: www.normalesup.org

      Language: English - Date: 2015-03-20 08:39:27
      186First Joint Meeting Brazil Italy of Mathematics Special Session: Algebraic Geometry over Finite Fields and its Applications to Coding Theory Rio de Janeiro, August 29 - September 02, 2016 Title: Generalized Twisted Gabid

      First Joint Meeting Brazil Italy of Mathematics Special Session: Algebraic Geometry over Finite Fields and its Applications to Coding Theory Rio de Janeiro, August 29 - September 02, 2016 Title: Generalized Twisted Gabid

      Add to Reading List

      Source URL: www.sbm.org.br

      - Date: 2016-04-19 11:01:46
        187Edgar H. Sibley Panel Editor Cyclic Redundancy Check (CRC) codes provide a simple yet powerful method of error detection during digital data transmission. Use of a table look-up in computing the CRC bits will efficiently

        Edgar H. Sibley Panel Editor Cyclic Redundancy Check (CRC) codes provide a simple yet powerful method of error detection during digital data transmission. Use of a table look-up in computing the CRC bits will efficiently

        Add to Reading List

        Source URL: www.ifp.illinois.edu

        Language: English - Date: 2003-07-08 17:17:18
        188BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren1 , Mart´ın Ochoa2,3 , and Andrei Sabelfeld1 1

        BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren1 , Mart´ın Ochoa2,3 , and Andrei Sabelfeld1 1

        Add to Reading List

        Source URL: www.cse.chalmers.se

        Language: English - Date: 2015-09-01 04:55:38
          189Useful Stuff Benjamin Smith Context Algebraic Curves  Useful Stuff

          Useful Stuff Benjamin Smith Context Algebraic Curves Useful Stuff

          Add to Reading List

          Source URL: ecc2011.loria.fr

          Language: English - Date: 2011-09-30 12:40:05
          190Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

          Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

          Add to Reading List

          Source URL: 2010.eccworkshop.org

          Language: English - Date: 2010-10-25 19:46:00