<--- Back to Details
First PageDocument Content
Abstract algebra / Algebra / Cryptography / Finite fields / Group theory / Logarithms / Computational hardness assumptions / Binary operations / Discrete logarithm / Elliptic curve cryptography / Prime number / Elliptic curve
Date: 2014-04-09 13:26:56
Abstract algebra
Algebra
Cryptography
Finite fields
Group theory
Logarithms
Computational hardness assumptions
Binary operations
Discrete logarithm
Elliptic curve cryptography
Prime number
Elliptic curve

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Download Document from Source Website

File Size: 1,04 MB

Share Document on Facebook

Similar Documents

C OLONEL B LOTTO : S EARCHING FOR PATTERNS IN A G AME OF A LLOCATION By Jeremiah Jones

C OLONEL B LOTTO : S EARCHING FOR PATTERNS IN A G AME OF A LLOCATION By Jeremiah Jones

DocID: 1rtXP - View Document

Time Series Lesson 9 Grant Foster  Representing Data

Time Series Lesson 9 Grant Foster Representing Data

DocID: 1rs99 - View Document

The Practical Use of the Bemer Method for Exponentials Update Version: September 5, 2006 Ron Doerfler (http://www.myreckonings.com) In Chapter 4 of my book, Dead Reckoning: Calculating Without Instruments, a method is gi

The Practical Use of the Bemer Method for Exponentials Update Version: September 5, 2006 Ron Doerfler (http://www.myreckonings.com) In Chapter 4 of my book, Dead Reckoning: Calculating Without Instruments, a method is gi

DocID: 1rrb5 - View Document

Microsoft Word - Eureka Math Grade 1 Module 3 Tips for Parents.docx

Microsoft Word - Eureka Math Grade 1 Module 3 Tips for Parents.docx

DocID: 1rqUG - View Document

Maths Home Learning Terms 5 & 6  Year 5 & 6 I know and understand

Maths Home Learning Terms 5 & 6 Year 5 & 6 I know and understand

DocID: 1rnQX - View Document