Finite fields

Results: 995



#Item
281Higher-Order Side Channel Security and Mask Refreshing Jean-S´ebastien Coron1 , Emmanuel Prouff2 , Matthieu Rivain3 , and Thomas Roche2 1

Higher-Order Side Channel Security and Mask Refreshing Jean-S´ebastien Coron1 , Emmanuel Prouff2 , Matthieu Rivain3 , and Thomas Roche2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:34:50
282Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () January 29, 2015

Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () January 29, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-01-29 15:31:09
283The University of Hong Kong DEPARTMENT OF MATHEMATICS MATH3302/MATH4302 Algebra II Suggested Solution to Assignment 1 In the following, E, F, K are fields. 1. Let E, K be two field extensions of F .

The University of Hong Kong DEPARTMENT OF MATHEMATICS MATH3302/MATH4302 Algebra II Suggested Solution to Assignment 1 In the following, E, F, K are fields. 1. Let E, K be two field extensions of F .

Add to Reading List

Source URL: hkumath.hku.hk

Language: English - Date: 2015-02-17 01:14:10
284The 11th International Conference on Finite Fields and their Applications Magdeburg, July 22-26, 2013 The conference will take place July 22-26, 2013, at the Otto-von-Guericke University Magdeburg,

The 11th International Conference on Finite Fields and their Applications Magdeburg, July 22-26, 2013 The conference will take place July 22-26, 2013, at the Otto-von-Guericke University Magdeburg,

Add to Reading List

Source URL: www.math.uni-magdeburg.de

Language: English - Date: 2013-04-07 13:02:32
285Lecture 4: Finite Fields (PART 1) PART 1: Groups, Rings, and Fields Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak ()

Lecture 4: Finite Fields (PART 1) PART 1: Groups, Rings, and Fields Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak ()

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-18 01:10:16
286138  Chapter 13 Wireless Protocols Wireless communication was one of the major success stories of the last decades.

138 Chapter 13 Wireless Protocols Wireless communication was one of the major success stories of the last decades.

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:47
287Counting points on elliptic curves David Harvey University of New South Wales 6th December 2012, Australian National University

Counting points on elliptic curves David Harvey University of New South Wales 6th December 2012, Australian National University

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2012-12-04 18:47:26
288T HE 11TH I NTERNATIONAL C ONFERENCE ON F INITE F IELDS AND THEIR A PPLICATIONS ¨ M AGDEBURG 22–26 J ULY 2013, OTTO - VON -G UERICKE -U NIVERSIT AT Sunday, ::00

T HE 11TH I NTERNATIONAL C ONFERENCE ON F INITE F IELDS AND THEIR A PPLICATIONS ¨ M AGDEBURG 22–26 J ULY 2013, OTTO - VON -G UERICKE -U NIVERSIT AT Sunday, ::00

Add to Reading List

Source URL: www.math.uni-magdeburg.de

Language: English - Date: 2013-07-10 10:20:22
289138  Chapter 13 Wireless Protocols Wireless communication was one of the major success stories of the last decades.

138 Chapter 13 Wireless Protocols Wireless communication was one of the major success stories of the last decades.

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:47
290M  AN752 CRC Algorithm for MCRF45X Read/Write Device

M AN752 CRC Algorithm for MCRF45X Read/Write Device

Add to Reading List

Source URL: ww1.microchip.com

Language: English - Date: 2009-06-14 08:31:35