Bit

Results: 9420



#Item
1Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung1, , Feng-Hao Liu2, , Chi-Jen Lu3 , and Bo-Yin Yang3 1  2

Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung1, , Feng-Hao Liu2, , Chi-Jen Lu3 , and Bo-Yin Yang3 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:37
2A Bit-fixing PRF with O(1) Collusion-Resistance from LWE Alex Davidson1,? and Ryo Nishimaki2 1  2

A Bit-fixing PRF with O(1) Collusion-Resistance from LWE Alex Davidson1,? and Ryo Nishimaki2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-10-18 18:40:38
3Location map Eichenweg 1, Zollikofen  Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

Location map Eichenweg 1, Zollikofen Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

Add to Reading List

Source URL: www.bit.admin.ch

    4Lecture 3, Tues Jan 24: Basic Rules of QM Tensor products are a way of building bigger vectors out of smaller ones. Let’s apply a NOT operation to the first bit, and do nothing to the second bit. That’s really the sa

    Lecture 3, Tues Jan 24: Basic Rules of QM Tensor products are a way of building bigger vectors out of smaller ones. Let’s apply a NOT operation to the first bit, and do nothing to the second bit. That’s really the sa

    Add to Reading List

    Source URL: www.scottaaronson.com

    Language: English - Date: 2018-08-29 13:55:03
    5Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

    Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:44
    6Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna  Secure Systems Pitney Bowes Inc.

    Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna Secure Systems Pitney Bowes Inc.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-11-01 07:43:52
    7GreenArrays  ® AN007 A Bit-Banged 10baseT NIC

    GreenArrays ® AN007 A Bit-Banged 10baseT NIC

    Add to Reading List

    Source URL: www.greenarraychips.com

    Language: English - Date: 2014-11-12 12:21:11
    8Location map Monbijoustrasse 74, Bern  Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

    Location map Monbijoustrasse 74, Bern Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

    Add to Reading List

    Source URL: www.bit.admin.ch

      9An MCSAT treatment of Bit-Vectors (preliminary report) St´ephane Graham-Lengrand1,2 and Dejan Jovanovi´c1 1 2

      An MCSAT treatment of Bit-Vectors (preliminary report) St´ephane Graham-Lengrand1,2 and Dejan Jovanovi´c1 1 2

      Add to Reading List

      Source URL: smt-workshop.cs.uiowa.edu

      Language: English - Date: 2017-09-02 14:08:49
      10Cofactorisation strategies for the number field sieve and an estimate for the sieving step for factoring 1024-bit integers Thorsten Kleinjung University of Bonn, Department of Mathematics, Beringstraße 1, DBonn,

      Cofactorisation strategies for the number field sieve and an estimate for the sieving step for factoring 1024-bit integers Thorsten Kleinjung University of Bonn, Department of Mathematics, Beringstraße 1, DBonn,

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2006-03-21 11:54:50