Quadratic residue

Results: 192



#Item
21Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:58
22math 420  FINAL EXAM Wednesday December 15, 1993

math 420 FINAL EXAM Wednesday December 15, 1993

Add to Reading List

Source URL: www.math.hawaii.edu

Language: English - Date: 2001-04-07 05:48:34
23Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov, Yandex LLC

Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov, Yandex LLC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 08:08:37
24Ramanujan’s sum Jordan Bell  Department of Mathematics, University of Toronto April 7, 2014

Ramanujan’s sum Jordan Bell Department of Mathematics, University of Toronto April 7, 2014

Add to Reading List

Source URL: individual.utoronto.ca

Language: English - Date: 2014-04-07 11:42:08
25

PDF Document

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-17 13:38:19
26On the Analysis of Cryptographic Assumptions in the Generic Ring Model Tibor Jager∗ Institut für Kryptographie und Sicherheit Karlsruhe Institute of Technology

On the Analysis of Cryptographic Assumptions in the Generic Ring Model Tibor Jager∗ Institut für Kryptographie und Sicherheit Karlsruhe Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-25 16:56:30
27Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
28PRIMES is in P Manindra Agrawal, Neeraj Kayal and Nitin Saxena∗ Department of Computer Science & Engineering Indian Institute of Technology Kanpur Kanpur, INDIA August 6, 2002

PRIMES is in P Manindra Agrawal, Neeraj Kayal and Nitin Saxena∗ Department of Computer Science & Engineering Indian Institute of Technology Kanpur Kanpur, INDIA August 6, 2002

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-08-09 16:45:44
29Factorization of a 768-bit RSA modulus version 1.21, January 13, 2010 Thorsten Kleinjung1 , Kazumaro Jens Franke3 , Arjen K. Lenstra1 , Emmanuel Thomé4 ,

Factorization of a 768-bit RSA modulus version 1.21, January 13, 2010 Thorsten Kleinjung1 , Kazumaro Jens Franke3 , Arjen K. Lenstra1 , Emmanuel Thomé4 ,

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2010-01-13 11:00:27
30Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang Harvard University

Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang Harvard University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-10 23:35:25