Euclidean algorithm

Results: 423



#Item
151Mathematical logic / Theoretical computer science / Fisher–Yates shuffle / Algorithm characterizations / Euclidean algorithm / Mathematics / Applied mathematics / Algorithm

Electronic version of an article published as Parallel Processing Letters, Volume 23, Issue 3, c World Scientific Publishing Company, 2013, PagesDOI: S0129626413500102 http://www.worldscientific.com/toc/

Add to Reading List

Source URL: drpage.pagewizardgames.com

Language: English - Date: 2014-09-02 14:40:29
152Modular arithmetic / Public-key cryptography / Finite fields / Integer factorization algorithms / RSA / Euclidean algorithm / Prime number / Discrete logarithm / Chinese remainder theorem / Abstract algebra / Mathematics / Cryptography

Cryptography and Computer Security CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-01-05 22:45:30
153Modular arithmetic / Public-key cryptography / Finite fields / Integer factorization algorithms / RSA / Euclidean algorithm / Prime number / Discrete logarithm / Chinese remainder theorem / Abstract algebra / Mathematics / Cryptography

Cryptography and Computer Security CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-01-03 00:02:54
154Modular arithmetic / Public-key cryptography / Finite fields / Integer factorization algorithms / RSA / Prime number / Euclidean algorithm / Discrete logarithm / Coprime / Abstract algebra / Mathematics / Cryptography

CS255: Cryptography and Computer Security Winter 2003 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-10 15:18:01
155XTR / Vehicle Identification Number / Information theory / Applied mathematics / Coding theory / Cryptography / Finite fields / Mathematics / Euclidean algorithm

CS255: Introduction to Cryptography Winter 2015 Assignment #3: Solutions Problem 1. (a) We have eeve deve = 1 (mod ϕ(N )). Thus, ϕ(N ) divides eeve deve − 1.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-15 20:33:19
156Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-03-21 01:47:16
157Finite fields / Field theory / Advanced Encryption Standard / Finite field arithmetic / Field / Finite field / Euclidean algorithm / Multiplicative inverse / GF / Abstract algebra / Mathematics / Algebra

Galois Field in Cryptography Christoforus Juan Benvenuto May 31, 2012 Abstract This paper introduces the basics of Galois Field as well as its implementation in storing data. This paper shows and helps visualizes that st

Add to Reading List

Source URL: www.math.washington.edu

Language: English - Date: 2012-06-11 18:41:39
158Abstract algebra / Integer factorization algorithms / Finite fields / Integer sequences / Modular arithmetic / Euclidean algorithm / Prime number / Miller–Rabin primality test / Solovay–Strassen primality test / Mathematics / Number theory / Primality tests

Solutions to Homework Three CSE[removed]a) Each time you roll a die, the chance of getting a six is p = 1/6. So the expected number of rolls until you see a six is 1/p = 6.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-10-17 13:59:47
159Polynomials / Classical orthogonal polynomials / Rational function / Euclidean algorithm / Partial fraction / Symmetric polynomial / Root-finding algorithm / Mathematics / Algebra / Abstract algebra

The Yacas Book of Algorithms by the Yacas team 1 Yacas version: 1.3.6

Add to Reading List

Source URL: yacas.sourceforge.net

Language: English - Date: 2014-11-25 15:54:56
160Artificial intelligence / Nearest neighbor search / Locality-sensitive hashing / IDistance / Randomized algorithm / K-nearest neighbor algorithm / Algorithm / K-d tree / Information science / Mathematics / Search algorithms

SRS: Solving c-Approximate Nearest Neighbor Queries in High Dimensional Euclidean Space with a Tiny Index Yifang Sun† † Wei Wang†

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-08-12 09:26:02
UPDATE