Irreducible polynomial

Results: 71



#Item
21The Mathematics of Coding: Information, Compression, Error Correction, and Finite Fields

The Mathematics of Coding: Information, Compression, Error Correction, and Finite Fields

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2007-10-17 12:13:25
22Innovations in Computer ScienceIdeal Forms of Coppersmith’s Theorem and Guruswami-Sudan List Decoding Henry Cohn∗ Nadia Heninger? Microsoft Research New England, One Memorial Drive, Cambridge, MA 02142

Innovations in Computer ScienceIdeal Forms of Coppersmith’s Theorem and Guruswami-Sudan List Decoding Henry Cohn∗ Nadia Heninger? Microsoft Research New England, One Memorial Drive, Cambridge, MA 02142

Add to Reading List

Source URL: conference.itcs.tsinghua.edu.cn

Language: English - Date: 2010-12-15 03:49:23
23FROBBY USER MANUAL - VERSIONBJARKE HAMMERSHOLT ROUNE September 23, 2011 Contents 1. Installation

FROBBY USER MANUAL - VERSIONBJARKE HAMMERSHOLT ROUNE September 23, 2011 Contents 1. Installation

Add to Reading List

Source URL: www.broune.com

Language: English - Date: 2011-09-23 16:39:42
24THINK 37 (AND 37A) PROBLEM SET 2  This set is due by noon on Thursday, October 11 in the manilla envelope in Otis Chodosh’s mailbox. Write solutions to four of the following eight problems. Pick problems suitable to yo

THINK 37 (AND 37A) PROBLEM SET 2 This set is due by noon on Thursday, October 11 in the manilla envelope in Otis Chodosh’s mailbox. Write solutions to four of the following eight problems. Pick problems suitable to yo

Add to Reading List

Source URL: math.stanford.edu

Language: English - Date: 2012-10-06 12:26:46
25Lecture 7: Finite Fields (PART 4) PART 4: Finite Fields of the Form GF (2n) Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () February 3, 20

Lecture 7: Finite Fields (PART 4) PART 4: Finite Fields of the Form GF (2n) Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () February 3, 20

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-03 16:04:57
26Abstracts of invited lectures Extended differential properties of cryptographic functions A NNE C ANTEAUT (INRIA-Rocquencournt, France) Differential cryptanalysis is one of the very first attack proposed against block ci

Abstracts of invited lectures Extended differential properties of cryptographic functions A NNE C ANTEAUT (INRIA-Rocquencournt, France) Differential cryptanalysis is one of the very first attack proposed against block ci

Add to Reading List

Source URL: www.math.uni-magdeburg.de

Language: English - Date: 2013-07-01 05:40:45
27Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () January 29, 2015

Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () January 29, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-01-29 15:31:09
28Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation Sujoy Sinha Roy1 , Kimmo J¨arvinen1 , Frederik Vercauteren1 , Vassil Dimitrov2 , and Ingrid Verbauwhede1 1

Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation Sujoy Sinha Roy1 , Kimmo J¨arvinen1 , Frederik Vercauteren1 , Vassil Dimitrov2 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 09:41:51
29Decomposition of Additive Cellular Automata

Decomposition of Additive Cellular Automata

Add to Reading List

Source URL: www.complex-systems.com

Language: English - Date: 2012-09-20 14:36:39
30Boolean Decision Functions Steven Finch April 22, 2015 Let  : {0 1} → {0 1} be the Boolean function that decides whether a given ( + 1)-bit odd integer is square-free. More precisely, ½

Boolean Decision Functions Steven Finch April 22, 2015 Let  : {0 1} → {0 1} be the Boolean function that decides whether a given ( + 1)-bit odd integer is square-free. More precisely, ½

Add to Reading List

Source URL: www.people.fas.harvard.edu

Language: English - Date: 2015-04-21 10:31:24