Finite fields

Results: 995



#Item
401Cryptographic protocols / Finite fields / Modular arithmetic / Direct Anonymous Attestation / Trusted Platform Module / Trusted Computing Group / Trusted Computing / XTR / RSA / Cryptography / Abstract algebra / Public-key cryptography

An Anonymous Authentication Scheme for Trusted Computing Platform He Ge ⋆⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-06 15:19:54
402Finite fields / Group theory / Elliptic curves / Cryptography / Polynomials / Elliptic curve / Lenstra elliptic curve factorization / Division polynomials / Prime number / Abstract algebra / Mathematics / Algebra

Elliptic Curves in Algorithmic Number Theory and Cryptography Otto Forster §1 Applications in Algorithmic Number Theory In this section we describe briefly the use of elliptic curves over finite fields for

Add to Reading List

Source URL: www.mathematik.uni-muenchen.de

Language: English - Date: 2003-12-07 11:29:32
403Finite fields / Hidden Field Equations / Quantum information science / QUAD / RSA / Quantum cryptography / Multivariate cryptography / Cryptography / Public-key cryptography / Post-quantum cryptography

非可換性を利用した多変数多項式電子署名

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:32:25
404Group testing / Reed–Solomon error correction / Molecular biology / Finite fields / Coding theory / Error detection and correction / Combinatorics

Accurate Decoding of Pooled Sequenced Data Using Compressed Sensing Denisa Duma1 , Mary Wootters2 , Anna C. Gilbert2 , Hung Q. Ngo3 , Atri Rudra3 , Matthew Alpert1 , Timothy J. Close4 , Gianfranco Ciardo1 , and Stefano L

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2013-07-18 13:27:18
405Number theory / Coin problem / Anatolii Alexeevitch Karatsuba / Finite fields / Frobenius algebra / Perron–Frobenius theorem / Mathematics / Abstract algebra / Algebra

c Pleiades Publishing, Ltd., 2012. ISSN, Proceedings of the Steklov Institute of Mathematics, 2012, Vol. 276, pp. 275–282.  c A.V. Ustinov, 2012, published in Trudy Matematicheskogo Instituta imeni V.A. Stek

Add to Reading List

Source URL: iam.khv.ru

Language: English - Date: 2013-08-25 18:51:00
406Field theory / Morphisms / Niels Henrik Abel / Finite field / Abelian group / Automorphism / Order / Field / Group homomorphism / Abstract algebra / Algebra / Group theory

All Finite Fields Have a Prime-Power Order Morphisms, Cauchy’s Theorem, and Proof of Theorem Daniel R. Page, 2011 (Updated December 20, 2012) Morphisms are a powerful tool in proving properties of mathematical objects

Add to Reading List

Source URL: www.pagewizardgames.com

Language: English - Date: 2014-09-02 14:47:09
407RSA / Finite fields / Cryptographic protocols / NTRUEncrypt / XTR / Cryptography / Public-key cryptography / Commitment scheme

CS255: Cryptography and Computer Security Winter 2000 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42
408Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
409Modular arithmetic / Public-key cryptography / Finite fields / Integer factorization algorithms / RSA / Prime number / Euclidean algorithm / Discrete logarithm / Coprime / Abstract algebra / Mathematics / Cryptography

CS255: Cryptography and Computer Security Winter 2003 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:09
410Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
UPDATE