Assignment problem

Results: 249



#Item
111Finite fields / Cryptographic protocols / Computational hardness assumptions / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / Digital signature / PP / One-way function / Cryptography / Abstract algebra / Mathematics

CS355: Topics in cryptography Spring 2014 Assignment #1 Due: Tuesday, May. 13, 2014.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-07 00:53:37
112Cryptographic protocols / Electronic commerce / Diffie–Hellman key exchange / XTR / ElGamal encryption / RSA / Discrete logarithm / Diffie–Hellman problem / Commitment scheme / Cryptography / Finite fields / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2005 Assignment #3 Due: Monday, Feb. 28th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-22 17:09:50
113Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / ElGamal encryption / XTR / RSA / Diffie–Hellman problem / Computational Diffie–Hellman assumption / Discrete logarithm / Cryptography / Public-key cryptography / Cryptographic protocols

CS255: Cryptography and Computer Security Winter 2003 Assignment #3 Due: Monday, March 3rd, 2003 at 5pm in CS255 box next to Gates 182.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-18 23:13:10
114Computational hardness assumptions / Electronic commerce / Cryptographic protocols / RSA / Diffie–Hellman key exchange / ElGamal encryption / XTR / Diffie–Hellman problem / Computational Diffie–Hellman assumption / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2002 Assignment #3 Due: Friday, March 8th, 2002 at 5pm.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-03-05 19:45:19
115XTR / Vehicle Identification Number / Information theory / Applied mathematics / Coding theory / Cryptography / Finite fields / Mathematics / Euclidean algorithm

CS255: Introduction to Cryptography Winter 2015 Assignment #3: Solutions Problem 1. (a) We have eeve deve = 1 (mod ϕ(N )). Thus, ϕ(N ) divides eeve deve − 1.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-15 20:33:19
116Deterministic encryption / Mathematical sciences / Science / Ciphertext indistinguishability / Cryptography / Advantage / Ciphertext

CS255: Introduction to Cryptography Winter 2015 Assignment #1: Solutions Problem 0. Let m0 be the message attack at dawn and m1 be the message attack at dusk, and let

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-12 00:12:50
117Educational psychology / Learning / Problem solving / Thought / Philosophy of education / Assignment / Is–ought problem / Competence / Question / Education / Law / Knowledge

On-the-Job Assignment Reflection Questions Purpose: What is the assignment I am trying to accomplish? What is my purpose for completing this assignment? How does this assignment aid in overall mission accomplishment? Q

Add to Reading List

Source URL: www.talent4socialchange.com

Language: English - Date: 2015-02-23 11:40:40
118Convex optimization / Operations research / Combinatorial optimization / Duality / Assignment problem / Markov decision process / Linear programming relaxation / Mathematical optimization / Linear programming / Mathematics

Value-directed Compression of Large-scale Assignment Problems Tyler Lu and Craig Boutilier Department of Computer Science University of Toronto {tl,cebly}@cs.toronto.edu

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2014-11-27 10:09:39
119Network theory / Ring theory / Semiring / Routing algorithms / Search algorithms / Shortest path problem / A* search algorithm / Static single assignment form / External / Mathematics / Algebra / Graph theory

A General Method for Assessment of Security in Complex Services ⋆ Leanid Krautsevich1 , Fabio Martinelli2 , and Artsiom Yautsiukhin2 1 2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2011-08-10 05:58:47
120Computing / Data structures / B-tree / Disjoint-set data structure / Rope / Linked list / R-tree / Ternary tree / Fibonacci heap / Binary trees / Graph theory / Data management

CS 157: Assignment 2 Douglas R. Lanman 27 February 2006 Problem 1: Union-Find with Deletions The union-find data structure, utilizing the “union-by-rank” and “path compression” heuristics, is

Add to Reading List

Source URL: mesh.brown.edu

Language: English - Date: 2006-02-27 14:13:36
UPDATE