<--- Back to Details
First PageDocument Content
Functions and mappings / Data types / Elementary mathematics / Fast inverse square root / Floating point / Methods of computing square roots / Multiplicative inverse / Exponentiation / Function / Mathematics / Root-finding algorithms / Computer arithmetic
Date: 2013-09-04 17:47:40
Functions and mappings
Data types
Elementary mathematics
Fast inverse square root
Floating point
Methods of computing square roots
Multiplicative inverse
Exponentiation
Function
Mathematics
Root-finding algorithms
Computer arithmetic

Add to Reading List

Source URL: shelfflag.com

Download Document from Source Website

File Size: 354,69 KB

Share Document on Facebook

Similar Documents

Cryptography / Exponentials / Cross-platform software / Cryptographic software / GNU Privacy Guard / OpenPGP / Privacy software / RSA / Exponentiation by squaring / Modular exponentiation / ElGamal encryption / Chosen-ciphertext attack

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1xW2E - View Document

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

DocID: 1vkME - View Document

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

DocID: 1vkLm - View Document

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1tEtV - View Document

EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

DocID: 1sa3i - View Document