Finite fields

Results: 995



#Item
111Decoding Random Binary Linear Codes in 2n/20 : How 1 + 1 = 0 Improves Information Set Decoding Anja Becker1 , Antoine Joux1,2 , Alexander May3! , and Alexander Meurer3!! 1  Universit´e de Versailles Saint-Quentin, Labor

Decoding Random Binary Linear Codes in 2n/20 : How 1 + 1 = 0 Improves Information Set Decoding Anja Becker1 , Antoine Joux1,2 , Alexander May3! , and Alexander Meurer3!! 1 Universit´e de Versailles Saint-Quentin, Labor

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2012-05-23 11:45:44
112Mathematical Research Letters  6, 613–SPACE FILLING CURVES OVER FINITE FIELDS Nicholas M. Katz

Mathematical Research Letters 6, 613–SPACE FILLING CURVES OVER FINITE FIELDS Nicholas M. Katz

Add to Reading List

Source URL: web.math.princeton.edu

Language: English - Date: 2010-10-24 17:07:38
113357  Documenta Math. On the Values of Equivariant Zeta Functions of Curves over Finite Fields

357 Documenta Math. On the Values of Equivariant Zeta Functions of Curves over Finite Fields

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2004-10-05 13:18:52
114Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-21 15:44:55
115at HOME E arly L earning MATH   H elping your children

at HOME E arly L earning MATH   H elping your children

Add to Reading List

Source URL: earlymathlearning.com

Language: English - Date: 2013-09-01 15:52:09
116Standards for Efficient Cryptography  SEC X.1: Supplemental Document for Odd Characteristic Extension Fields Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai

Standards for Efficient Cryptography SEC X.1: Supplemental Document for Odd Characteristic Extension Fields Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
117The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:22:52
118A Vélu-like formula for computing isogenies on Abelian Varieties David Lubicz1,2 , Damien Robert3 1 2 3

A Vélu-like formula for computing isogenies on Abelian Varieties David Lubicz1,2 , Damien Robert3 1 2 3

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
119Annals of Mathematics, ), Factoring integers with elliptic curves By H. W.  LENSTRA, JR.

Annals of Mathematics, ), Factoring integers with elliptic curves By H. W. LENSTRA, JR.

Add to Reading List

Source URL: www.mat.uniroma2.it

Language: English - Date: 2008-11-09 06:36:38
120On the supersingular reduction of elliptic curves

On the supersingular reduction of elliptic curves

Add to Reading List

Source URL: www.mast.queensu.ca

Language: English - Date: 2016-03-21 18:26:40