Finite fields

Results: 995



#Item
871Deterministic equation solving over finite fields Proefschrift

Deterministic equation solving over finite fields Proefschrift

Add to Reading List

Source URL: www.opt.math.tugraz.at

Language: English - Date: 2006-04-23 11:16:58
872An overview of the Birch-Swinnerton-Dyer conjecture

An overview of the Birch-Swinnerton-Dyer conjecture

Add to Reading List

Source URL: www.math.dartmouth.edu

Language: English - Date: 2002-11-15 08:48:53
873THE IWASAWA MAIN CONJECTURES FOR GL2 CHRISTOPHER SKINNER AND ERIC URBAN

THE IWASAWA MAIN CONJECTURES FOR GL2 CHRISTOPHER SKINNER AND ERIC URBAN

Add to Reading List

Source URL: www.math.columbia.edu

Language: English - Date: 2013-01-23 18:11:33
874Ring Theoretic Properties of Certain Hecke Algebras Richard Taylor

Ring Theoretic Properties of Certain Hecke Algebras Richard Taylor

Add to Reading List

Source URL: www.math.ias.edu

Language: English - Date: 2011-04-25 18:52:25
875Design of LDPC codes • •

Design of LDPC codes • •

Add to Reading List

Source URL: www.ii.uib.no

Language: English - Date: 2006-11-03 03:48:16
876Error Correcting Codes: Combinatorics, Algorithms and Applications  (Fall 2007)

Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007)

Add to Reading List

Source URL: www.cse.buffalo.edu

Language: English - Date: 2009-04-03 02:04:38
877Censored Exploration and the Dark Pool Problem  Kuzman Ganchev, Michael Kearns, Yuriy Nevmyvaka, Jennifer Wortman Vaughan

Censored Exploration and the Dark Pool Problem Kuzman Ganchev, Michael Kearns, Yuriy Nevmyvaka, Jennifer Wortman Vaughan

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-05-27 11:21:09
878In Advances in Cryptology—Asiacrypt’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]Doing More with Fewer Bits

In Advances in Cryptology—Asiacrypt’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]Doing More with Fewer Bits

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2000-02-21 14:17:00
879Is the Data Encryption Standard a group? (Results of cycling experiments on DES)

Is the Data Encryption Standard a group? (Results of cycling experiments on DES)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-02 16:24:32
880A knapsack-type public key cryptosystem based on arithmetic in finite fields - Information Theory, IEEE Transactions on

A knapsack-type public key cryptosystem based on arithmetic in finite fields - Information Theory, IEEE Transactions on

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-02 16:23:31