Finite fields

Results: 995



#Item
471Arithmetic / Mathematical notation / Summation / Error detection and correction / Finite fields / BCH code / AN codes / Mathematics / Mathematical analysis / Abstract algebra

Microsoft Word - PMcc3ATest

Add to Reading List

Source URL: www.singaporemath.com

Language: English - Date: 2014-10-31 18:02:55
472Elliptic curve / Lenstra elliptic curve factorization / Discrete logarithm / XTR / Elliptic Curve DSA / Prime number / Cyclic group / Hyperelliptic curve cryptography / Hessian form of an elliptic curve / Abstract algebra / Finite fields / Elliptic curve cryptography

Reverse Engineering of Strong CryptoSignatures Schemes

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:56
473XTR / Star Trek / Science / Finite fields / Q / Quartermasters

Southern Division of General Practice Inc (www.sdgp.com.au) - August 2008 Health Assessment Questionnaire Aged over 55 years Medicare items 700 to 706 (ATSI: Assessment includes home visit: Item 704, Assessment at medica

Add to Reading List

Source URL: www.nmml.org.au

Language: English - Date: 2013-04-22 01:24:36
474Information theory / Mathematics / Discrete mathematics / Linear code / Cyclic code / SHA-1 / SHA-2 / Coding theory / Finite fields / Cryptographic hash functions

A Simple and Provably Good Code for SHA Message Expansion Charanjit S. Jutla IBM Thomas J. Watson Research Center Yorktown Heights, NY[removed]removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-05 18:05:15
475Elliptic curve cryptography / Elliptic curve / Curve / Mathematics / Finite fields / Cryptography

Call For Papers - NIST Workshop on Elliptic Curve Cryptography Standards (June 2015)

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-01-15 12:54:38
476Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
477Cryptographic protocols / Electronic commerce / Computational hardness assumptions / RSA / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm / Schmidt–Samoa cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-05-13 22:32:41
478Cryptographic protocols / Electronic commerce / Computational hardness assumptions / RSA / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm / Schmidt–Samoa cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-05 20:38:47
479Algorithm / Applied mathematics / Mathematics / Finite fields / XTR

Generalized Methods for Restricted Weak Composition Enumeration Daniel R. Page Department of Computer Science Seminar Series University of Manitoba Winnipeg, Manitoba, Canada

Add to Reading List

Source URL: drpage.pagewizardgames.com

Language: English - Date: 2014-09-02 14:41:22
480Hardware description languages / Error detection and correction / CRC / VHDL / Mathematics / Electronic engineering / Computing / Finite fields / Binary arithmetic / Cyclic redundancy check

crc MegaCore Function Parameterized CRC Generator/Checker ®

Add to Reading List

Source URL: web.archive.org

Language: English
UPDATE