Logarithm

Results: 1955



#Item
581Group theory / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Diffie–Hellman problem / Baby-step giant-step / Elliptic curve / Diffie–Hellman key exchange / Abstract algebra / Cryptography / Mathematics

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
582Statistical theory / Mathematics / Network theory / Networks / Maximum likelihood / Bayesian network / Kullback–Leibler divergence / Complex network / Logarithm / Statistics / Estimation theory / Bayesian statistics

Outline Uncovering (global) structure and (local) motifs in networks 1 - Looking for structure in networks

Add to Reading List

Source URL: www.cs.tut.fi

Language: English - Date: 2008-07-01 04:57:33
583Integer factorization algorithms / Finite fields / Computational hardness assumptions / Algebraic number theory / Group theory / XTR / Discrete logarithm / Quadratic sieve / Integer factorization / Abstract algebra / Mathematics / Algebra

Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:23:19
584Line / Slope / Triangle / Gradient / Logarithm / Homogeneous coordinates / Hyperbola / Geometry / Mathematics / Analytic geometry

MEP Y8 Practice Book B 14 Straight Line Graphs 14.1 Coordinates You will have used coordinates in Unit 3 of Book Y7A. In this section, we revisit coordinates before starting work on lines and graphs.

Add to Reading List

Source URL: secondary.esbergen.eu

Language: English - Date: 2011-07-03 15:40:42
585Logarithms / Cobb–Douglas production function / Microeconomics / Utility / Derivative / Natural logarithm / Function / Mathematics / Mathematical analysis / Functions and mappings

On the generation of a regular multi-input multi-output technology using parametric output distance functions Sergio Perelman a and Daniel Santin b a b

Add to Reading List

Source URL: www2.ulg.ac.be

Language: English - Date: 2007-12-11 07:37:07
586Statistics / Control theory / Data assimilation / Statistical forecasting / Weather prediction / Logarithm / X Window System / Software / Bayesian statistics / Estimation theory

Model Data comparisons •  Model fields vs observations Obs monitoring gives global view (esp for commissioning phase, or for developing climate quality datasets) •  Reanalyses vs observations

Add to Reading List

Source URL: cci.esa.int

Language: English - Date: 2014-11-04 01:32:30
587Non-adjacent form / Exponentiation / Logarithm / Binary numeral system / Exponentiation by squaring / Mathematics / Elementary mathematics / Exponentials

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:26
588Integer sequences / Modular arithmetic / Quadratic residue / Zero-knowledge proof / Blum integer / Non-interactive zero-knowledge proof / Proof of knowledge / NP / IP / Cryptography / Mathematics / Cryptographic protocols

The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm∗ Chunming Tang †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-03 03:50:58
589Group theory / Algebraic curves / Hyperelliptic curve cryptography / Public-key cryptography / Hyperelliptic curve / Elliptic curve / XTR / Discrete logarithm / RAR / Abstract algebra / Finite fields / Cryptography

Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over F2n Izuru Kitamura and Masanobu Katagi Sony Corporation, Kitashinagawa Shinagawa-ku, Tokyo, Japan {Izuru.Kitamura, Masanobu.Ka

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-28 08:21:17
590Finite fields / Cryptographic protocols / Diffie–Hellman problem / Pairing-based cryptography / Hellman / Diffie–Hellman key exchange / Discrete logarithm / Whitfield Diffie / BLS / Cryptography / Abstract algebra / Computational hardness assumptions

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
UPDATE