Elliptic functions

Results: 192



#Item
61Mathematical optimization / Differential equations / Partial differential equations / Fourier analysis / Generalized functions / Heat equation / Dirichlet problem / Elliptic operator / Semidefinite programming / Mathematical analysis / Calculus / Mathematics

22nd National Conference of the Australian Society for Operations Research, Adelaide, Australia, 1–6 December 2013 www.asor.org.au/conferences/asor2013 Mathematical Programming Gives Hard Bounds of the Dirichlet Proble

Add to Reading List

Source URL: www.asor.org.au

Language: English - Date: 2013-11-24 18:45:34
62Analytic functions / PV-Wave / Error function / Gamma function / C standard library / Fortran / Bessel function / Elliptic integral / Mathematical analysis / Special functions / Array programming languages

Doc-To-Help Standard Template

Add to Reading List

Source URL: www.absoft.com

Language: English - Date: 2013-05-30 11:24:41
63Elliptic curve cryptography / Elliptic curves / Exponential function / Exponentials / Algebraic curves / Doubling-oriented Doche–Icart–Kohel curve / Linear differential equation / Mathematical analysis / Special functions / Algebraic geometry

3 Introduction To Algebra Basic Practice 1. Simplify the following.

Add to Reading List

Source URL: www.singaporemath.com

Language: English - Date: 2012-08-17 22:35:45
64Modular forms / Elliptic functions / Q-analogs

THE POLAR REPRESENTATION THEOREM FOR LINEAR HAMILTONIAN SYSTEMS JORGE REZENDE Let n = 1, 2, . . .. If M is a real matrix, we shall denote M ∗ its transpose. In is the identity n × n matrix.

Add to Reading List

Source URL: gfm.cii.fc.ul.pt

Language: English - Date: 2006-11-10 04:57:26
65Riemann zeta function / Zeta function / L-function / Sage / Elliptic curve / Airy zeta function / Mathematics / Analytic number theory / Riemann hypothesis

Sage Reference Manual: L-Functions Release 6.6.beta0 The Sage Development Team February 21, 2015

Add to Reading List

Source URL: sagemath.org

Language: English - Date: 2015-02-21 07:35:22
66Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
67Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
68Key management / Implicit certificate / Electronic commerce / Hash function / SHA-1 / Collision resistance / Digital signature / Public key certificate / Elliptic curve cryptography / Cryptography / Cryptographic hash functions / Public-key cryptography

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Matthew Campagna ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:13
69Lie algebras / Representation theory of Lie groups / Modular forms / Analytic number theory / Elliptic functions / Vertex operator algebra / Theta function / Weight / Weyl character formula / Mathematical analysis / Abstract algebra / Mathematics

ON MODULAR INVARIANCE AND RIGIDITY THEOREMS KEFENG LIU Contents 1. Introduction

Add to Reading List

Source URL: www.math.ucla.edu

Language: English - Date: 2002-05-13 12:30:55
70Cryptographic hash functions / Cryptography standards / Elliptic curve cryptography / SHA-2 / HMAC / PKCS / SHA-1 / Smart card / PCI Express / Cryptography / Cryptographic software / Error detection and correction

TrustWay Crypto PCI: an EAL4+ Common Criteria certified, ANSSI-qualified, cryptographic resource TrustWay® Crypto PCI is a cryptographic solution – 100% developed and manufactured in France by Bull – featuring the l

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2011-05-09 09:52:35
UPDATE