Finite fields

Results: 995



#Item
291MQ Challenge: Hardness Evaluation of Solving MQ problems

MQ Challenge: Hardness Evaluation of Solving MQ problems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:40:15
292Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak†  Avi Wigderson‡

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:30
293The University of Hong Kong DEPARTMENT OF MATHEMATICS MATH3302/MATH4302 Algebra II Assignment 1 Due: Tuesday 1 pm, February 17, 2015. In the following, E, F, K are fields.

The University of Hong Kong DEPARTMENT OF MATHEMATICS MATH3302/MATH4302 Algebra II Assignment 1 Due: Tuesday 1 pm, February 17, 2015. In the following, E, F, K are fields.

Add to Reading List

Source URL: hkumath.hku.hk

Language: English - Date: 2015-02-02 23:06:33
294Counting points on smooth plane quartics David Harvey University of New South Wales Number Theory Down Under, University of Newcastle 25th October 2014

Counting points on smooth plane quartics David Harvey University of New South Wales Number Theory Down Under, University of Newcastle 25th October 2014

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2014-10-25 21:41:45
295CCCG 2011, Toronto ON, August 10–12, 2011  Staying Close to a Curve∗ Anil Maheshwari  J¨

CCCG 2011, Toronto ON, August 10–12, 2011 Staying Close to a Curve∗ Anil Maheshwari J¨

Add to Reading List

Source URL: 2011.cccg.ca

Language: English - Date: 2011-08-06 04:11:16
296Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 00:56:33
297A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur  Ayoub Otmani 2 Jean-Pierre Tillich

A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur Ayoub Otmani 2 Jean-Pierre Tillich

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:27:24
298Christmas Multiplication Practice Worksheet 1

Christmas Multiplication Practice Worksheet 1

Add to Reading List

Source URL: www.tlsbooks.com

Language: English - Date: 2013-12-15 23:32:18
299SELECTED TOPICS IN  INFORMATION AND CODING THEORY  Series on Coding Theory and Cryptology

SELECTED TOPICS IN INFORMATION AND CODING THEORY Series on Coding Theory and Cryptology

Add to Reading List

Source URL: www-igm.univ-mlv.fr

Language: English - Date: 2010-05-06 02:03:50
300Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 07:04:42