Finite fields

Results: 995



#Item
321

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 10:55:50
322

PDF Document

Add to Reading List

Source URL: www.sal.wisc.edu

Language: English - Date: 2013-06-13 14:10:48
323

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 09:56:04
324

PDF Document

Add to Reading List

Source URL: www-igm.univ-mlv.fr

Language: English - Date: 2010-05-06 02:03:50
325

PDF Document

Add to Reading List

Source URL: www.digikey.com

Language: English - Date: 2011-01-11 11:24:04
326

PDF Document

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-23 23:15:02
327

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-06-29 06:52:43
328

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:13:04
329On the Possibility of Constructing Meaningful Hash Collisions for Public Keys Arjen Lenstra1,2 and Benne de Weger2 1  Lucent Technologies, Bell Laboratories, Room 2T-504

On the Possibility of Constructing Meaningful Hash Collisions for Public Keys Arjen Lenstra1,2 and Benne de Weger2 1 Lucent Technologies, Bell Laboratories, Room 2T-504

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-07-13 08:18:19
330On the Analysis of Cryptographic Assumptions in the Generic Ring Model Tibor Jager∗ Institut für Kryptographie und Sicherheit Karlsruhe Institute of Technology

On the Analysis of Cryptographic Assumptions in the Generic Ring Model Tibor Jager∗ Institut für Kryptographie und Sicherheit Karlsruhe Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-25 16:56:30