Computational number theory

Results: 224



#Item
91Applied mathematics / Computational complexity theory / Algorithm / Combinatorics / Formal methods / Algorithmic Number Theory Symposium / Indocrypt / Lecture Notes in Computer Science / Mathematics / Computer science

COCOON 2012 The 18th Annual International Computing and Combinatorics Conference[removed]August 2012, Sydney, Australia. Original research papers in the areas of algorithms, theory of computation, computational complexity,

Add to Reading List

Source URL: cocoon.it.usyd.edu.au

Language: English - Date: 2011-10-31 20:39:26
92Computer arithmetic / Numerical software / Cross-platform software / Computational number theory / Lattice points / Arbitrary-precision arithmetic / GNU Multiple Precision Arithmetic Library / Euclidean algorithm / Algorithm / Mathematics / Computing / Applied mathematics

Arageli: a Library for Algebraic Computations. Overview of Architecture Sergey S. Lyalin and Nikolai Yu. Zolotykh N.I. Lobachevsky State University, Gagarin ave. 23, Nizhni Novgorod, 603950, Russia [removed]

Add to Reading List

Source URL: arageli.org

Language: English - Date: 2006-08-31 11:39:53
93Cylindrical algebraic decomposition / Algebraic geometry / Computational mathematics / Real closed field / Computational geometry / Discrete mathematics / Algorithmic Number Theory Symposium / Combinatorics / Geometry / Mathematics / Real algebraic geometry / Algebra

Saugata Basu Department of Mathematics Purdue University West Lafayette, IN[removed]ph: ([removed]o[removed] (c) email: [removed]

Add to Reading List

Source URL: www.math.purdue.edu

Language: English - Date: 2014-07-27 08:57:44
94Computational number theory / Cryptography / Factorization of polynomials over a finite field and irreducibility tests / XTR / Polynomials / Fiber bundles / Coding theory

Reptile Mystery Math Division Worksheet

Add to Reading List

Source URL: www.tlsbooks.com

Language: English - Date: 2013-11-11 01:53:39
95Integer sequences / Mathematical logic / Refactorable number / Theorem / Conjecture / Mathematical proof / Number theory / Counterexample / HR / Mathematics / Logic / Science

Computational Creativity Autumn School Lecture 4 Building an Automated Mathematician Simon Colton Computational Creativity Group

Add to Reading List

Source URL: ccg.doc.gold.ac.uk

Language: English - Date: 2013-09-18 13:05:32
96Pedagogy / Learning / Human–computer interaction / E-learning / Computer-mediated communication / Asynchronous learning / Learning analytics / Blended learning / Computational learning theory / Education / Knowledge / Distance education

Laurie P. Dringus, Ph.D. Professor, Graduate School of Computer and Information Sciences Nova Southeastern University Carl DeSantis Building, 4th floor (office number[removed]College Avenue Ft. Lauderdale, FL 33314

Add to Reading List

Source URL: www.scis.nova.edu

Language: English - Date: 2014-03-26 11:57:02
97Applied mathematics / Cryptography / Inductive reasoning / Random number generation / Entropy / Pseudorandomness / Randomness / Information theory / Probability and statistics

Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness Nadia Heninger Princeton University August 10, 2010

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2011-07-14 20:36:31
98Linear algebra / Computational number theory / Cryptography / Lattice reduction / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice problem / Lattice / Integer relation algorithm / Vector space / Mathematics / Algebra / Lattice points

Lattice Reduction: a Toolbox for the Cryptanalyst Antoine Joux Jacques Stern

Add to Reading List

Source URL: www1.lip6.fr

Language: English - Date: 2015-01-20 15:22:52
99Pi / Polynomial / Number theory / Computer arithmetic / Context of computational complexity / Radix sort / Mathematics / Group theory / Number

Problem A - Root Given a polynomial of degree 5, find the real root of the polynomial. You can assume that there is exactly one real root for the input polynomial and that root must within the range[removed], [removed]Inp

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2006-04-28 09:54:18
100Randomness / Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Random number generation / Cryptographic hash function / Hash function / Fortuna / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Chalmers Publication Library Splittable Pseudorandom Number Generators using Cryptographic Hashing This document has been downloaded from Chalmers Publication Library (CPL). It is the author´s version of a work that was

Add to Reading List

Source URL: publications.lib.chalmers.se

Language: English - Date: 2013-09-18 07:30:31
UPDATE