Modular arithmetic

Results: 480



#Item
41Characterizing algebras and varieties by weak congruence lattices and open problems ˇ selja Andreja Tepavˇcevi´c and Branimir Seˇ Department of Mathematics and Informatics, Faculty of Sciences

Characterizing algebras and varieties by weak congruence lattices and open problems ˇ selja Andreja Tepavˇcevi´c and Branimir Seˇ Department of Mathematics and Informatics, Faculty of Sciences

Add to Reading List

Source URL: spot.colorado.edu

Language: English - Date: 2010-06-06 18:32:54
42FLINT Fast Library for Number Theory VersionMarch 2011 William Hart∗ , Fredrik Johansson† , Sebastian Pancratz‡

FLINT Fast Library for Number Theory VersionMarch 2011 William Hart∗ , Fredrik Johansson† , Sebastian Pancratz‡

Add to Reading List

Source URL: www.flintlib.org

Language: English - Date: 2014-12-31 19:00:00
43Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:08:28
44Continued fractions and number systems: applications to correctly-rounded implementations of elementary functions and modular arithmetic. Mourad Gouicem PEQUAN Team, LIP6/UPMC

Continued fractions and number systems: applications to correctly-rounded implementations of elementary functions and modular arithmetic. Mourad Gouicem PEQUAN Team, LIP6/UPMC

Add to Reading List

Source URL: caramba.inria.fr

Language: English - Date: 2016-02-23 03:15:09
    45DEPARTMENT OF MATHEMATICS UNIVERSITY OF NIJMEGEN The Netherlands Cubic reciprocity and explicit primality tests for h · 3k ± 1

    DEPARTMENT OF MATHEMATICS UNIVERSITY OF NIJMEGEN The Netherlands Cubic reciprocity and explicit primality tests for h · 3k ± 1

    Add to Reading List

    Source URL: www.math.ru.nl

    Language: English - Date: 2008-03-26 17:39:14
    460 (k(p) ) The structure of k(p) Product

    0 (k(p) ) The structure of k(p) Product

    Add to Reading List

    Source URL: sarah-whitehouse.staff.shef.ac.uk

    Language: English - Date: 2005-12-21 04:54:24
    47Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

    Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English - Date: 2016-01-19 07:39:30
    48Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    49Some computational experiments in number theory Wieb Bosma Mathematisch Instituut Radboud University Nijmegen Nijmegen, the Netherlands

    Some computational experiments in number theory Wieb Bosma Mathematisch Instituut Radboud University Nijmegen Nijmegen, the Netherlands

    Add to Reading List

    Source URL: www.math.ru.nl

    Language: English - Date: 2015-03-11 15:47:45
    50A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

    A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English