Finite fields

Results: 995



#Item
621Operator theory / XTR / Commitment scheme / Entropy / ElGamal encryption / Representation theory of finite groups / Cryptography / Finite fields / Information theory

On Continual Leakage of Discrete Log Representations Shweta Agrawal∗ Yevgeniy Dodis† Vinod Vaikuntanathan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-28 14:17:56
622Finite fields / Electronic commerce / Mathematics / Cyberwarfare / Reed–Solomon error correction / McEliece cryptosystem / Symbol / XTR / Applied mathematics / Public-key cryptography / Post-quantum cryptography / Cryptography

New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC Masao KASAHARA ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 23:59:57
623Information theory / Finite fields / Mathematics / Computer arithmetic / Binary arithmetic / Linear code / Hamming code / Polynomial code / Block code / Coding theory / Error detection and correction / Abstract algebra

Error Detection and Correction Using the BCH Code 1 Error Detection and Correction Using the BCH Code Hank Wallace

Add to Reading List

Source URL: www.aqdi.com

Language: English - Date: 2005-04-28 12:26:06
624Finite fields / Error detection and correction / Matrices / Matrix theory / BCH code / MDS matrix / Polynomial code / Cyclic code / Matrix / Algebra / Coding theory / Mathematics

Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Daniel Augot1 and Matthieu Finiasz2 1 INRIA - LIX UMR 7161 X-CNRS

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 11:34:39
625Group theory / Algebraic number theory / Galois theory / Algebraic topology / Galois module / Elliptic curve / Finite field / Galois group / Spectral sequence / Abstract algebra / Algebra / Field theory

Fields Institute Communications Volume 56, 2009 Local Galois Symbols on E × E Jacob Murre Department of Mathematics

Add to Reading List

Source URL: www.math.caltech.edu

Language: English - Date: 2009-07-01 17:56:31
626XTR / One-way function / Cramer–Shoup cryptosystem / RSA / Paillier cryptosystem / Advantage / Ideal lattice cryptography / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Finite fields

Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1 New York University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:08:40
627Area / Educational psychology / Coding theory / Error detection and correction / Mathematical anxiety / Vacuous truth / Mathematics / Abstract algebra / Finite fields

125284_MATHBook[removed]:19 PM

Add to Reading List

Source URL: www.edu.gov.mb.ca

Language: English - Date: 2008-11-19 14:25:49
628Mathematics / Group theory / Operator theory / Ordinary differential equations / Spectral theory / Finite fields / Verifiable random function / XTR

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-22 17:50:24
629Finite fields / Key management / Secret sharing / Linear code / Algebraic geometry / Secure multi-party computation / RSA / Secret sharing using the Chinese remainder theorem / Verifiable secret sharing / Cryptography / Cryptographic protocols / Coding theory

Secure Computation from Random Error Correcting Codes Hao Chen1 , Ronald Cramer2 , Shafi Goldwasser3 , Robbert de Haan4 , and Vinod Vaikuntanathan5 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:27
630Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
UPDATE