Symmetric functions

Results: 142



#Item
41K-THEORETIC SCHUBERT CALCULUS FOR OG(n, 2n + 1) AND JEU DE TAQUIN FOR SHIFTED INCREASING TABLEAUX EDWARD CLIFFORD, HUGH THOMAS, AND ALEXANDER YONG Abstract. We present a proof of a Littlewood-Richardson rule for the K-th

K-THEORETIC SCHUBERT CALCULUS FOR OG(n, 2n + 1) AND JEU DE TAQUIN FOR SHIFTED INCREASING TABLEAUX EDWARD CLIFFORD, HUGH THOMAS, AND ALEXANDER YONG Abstract. We present a proof of a Littlewood-Richardson rule for the K-th

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2010-08-14 13:11:11
42COMBINATORIAL RULES FOR THREE BASES OF POLYNOMIALS COLLEEN ROSS AND ALEXANDER YONG A BSTRACT. We present combinatorial rules (one theorem and two conjectures) concerning three bases of Z[x1 , x2 , ....]. First, we prove

COMBINATORIAL RULES FOR THREE BASES OF POLYNOMIALS COLLEEN ROSS AND ALEXANDER YONG A BSTRACT. We present combinatorial rules (one theorem and two conjectures) concerning three bases of Z[x1 , x2 , ....]. First, we prove

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2015-04-10 22:18:18
43Living with post quantum cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
44Symmetric Lenses (Full version) Martin Hofmann Benjamin Pierce

Symmetric Lenses (Full version) Martin Hofmann Benjamin Pierce

Add to Reading List

Source URL: dmwit.com

Language: English - Date: 2010-08-11 18:17:21
45Commutative Algebra and Algebraic Geometry Seminar Organizer: D. Eisenbud Tuesday, 3:45–6:00pm, 939 Evans  Apr. 6

Commutative Algebra and Algebraic Geometry Seminar Organizer: D. Eisenbud Tuesday, 3:45–6:00pm, 939 Evans Apr. 6

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2008-08-21 11:47:25
46Discrete Mathematics and Theoretical Computer Science  DMTCS vol. (subm.), by the authors, 1–1 Genomic Tableaux and Combinatorial K-Theory

Discrete Mathematics and Theoretical Computer Science DMTCS vol. (subm.), by the authors, 1–1 Genomic Tableaux and Combinatorial K-Theory

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2015-04-14 09:40:42
47Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
48Dierential Power Analysis Paul Kocher, Joshua Jae, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 17:02:16
49Permutation-based symmetric cryptography and Keccak  Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
50Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory  1

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45