−1

Results: 1637835



#Item
861Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Negligible function / XTR / Zero-knowledge proof

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 3: More Interactive Proofs 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Language: English
862Repeal / Statutory law / English criminal law / United States Code / Citation of United Kingdom legislation

Bill Format Template for Proposed Bill in an Initiative 1 For the construction of a proposed initiated law, the first and sometimes only section should be identified as section 1. Any additional sections must be identifi

Add to Reading List

Source URL: soswy.state.wy.us

Language: English - Date: 2017-03-03 13:29:08
863Theoretical computer science / Mathematics / Computational complexity theory / Formal methods / Electronic design automation / Logic in computer science / NP-complete problems / Boolean algebra / Boolean satisfiability problem / DPLL / Phase-locked loop / Satisfiability

Abstract DPLL and Abstract DPLL Modulo Theories Robert Nieuwenhuis1 , Albert Oliveras1 , and Cesare Tinelli2 1 Technical University of Catalonia

Add to Reading List

Source URL: www.lsi.upc.edu

Language: English - Date: 2005-03-21 16:24:36
864

Situationsplan FMH Olten Baslerstrasse 47 (Cityhof), 1. Stock, Olten Anfahrt mit ÖV Mit dem Zug bis Bahnhof Olten. Fussweg ab Bahnhof Olten, ca. 10 Minuten.

Add to Reading List

Source URL: www.fmh.ch

- Date: 2017-06-09 10:10:37
    865Cryptography / Public-key cryptography / Digital signature / BonehLynnShacham

    Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions Theresa Calderon1 and Sarah Meiklejohn1 and Hovav Shacham1 and Brent Waters2 1

    Add to Reading List

    Source URL: smeiklej.com

    Language: English - Date: 2018-10-23 14:58:02
    866Mathematics / Logarithms / Mathematical analysis / Discrete mathematics / Binary logarithm / 108 / Factorial / Prime number / Common logarithm / P

    Se urity Estimates for Quadrati Field Based Cryptosystems Jean-Fran ois Biasse1 , Mi hael J. Ja obson, Jr.2 ? , and Alan K. Silvester3 1 

    Add to Reading List

    Source URL: www.lix.polytechnique.fr

    Language: English - Date: 2014-09-02 14:57:05
    867

                  1,

    Add to Reading List

    Source URL: precision.moscito.org

    Language: Vietnamese - Date: 2011-03-20 04:03:36
      868Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1

      Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

      Add to Reading List

      Source URL: who.rocq.inria.fr

      Language: English - Date: 2018-06-14 07:12:36
      869Energy conservation / Lockheed Corporation / Trident / Energy service company / Fiction / Energy

      STATE OF WYOMING WYECIP Lite Energy Management Program (WYLITE) - Pre-Approval Guidelines Instructions 1. Review and complete the program eligibility information below. Information to be completed by WBC Regional Direct

      Add to Reading List

      Source URL: www.wyomingbusiness.org

      Language: English - Date: 2016-11-01 15:13:03
      870Statistical randomness / Mathematical analysis / Probability theory / Stochastic processes / Markov models / Graph theory / Markov chain / Stochastic differential equations / Distribution / Stochastic simulation / Normal distribution / Decomposition of spectrum

      Approximation of Probabilistic Reachability for Chemical Reaction Networks using the Linear Noise Approximation∗ Luca Bortolussi3 , Luca Cardelli1,2 , Marta Kwiatkowska2 , and Luca Laurenti2 1

      Add to Reading List

      Source URL: qav.comlab.ox.ac.uk

      Language: English - Date: 2016-06-06 06:37:52
      UPDATE