XTR

Results: 836



#Item
21MINUTES FOR APRIL 2007 MEETING OF ISO/JTC1/SC22/WG14 AND INCITS J11 WG14/N1267 Meeting Location: Monday, Wednesday, Thursday April 23, 25, & 26:

MINUTES FOR APRIL 2007 MEETING OF ISO/JTC1/SC22/WG14 AND INCITS J11 WG14/N1267 Meeting Location: Monday, Wednesday, Thursday April 23, 25, & 26:

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2007-11-10 16:14:55
22WIEFERICH PAST AND FUTURE NICHOLAS M. KATZ 1. The early history Fermat’s Last Theorem (FLT) is the assertion that for n ≥ 3, the equation X n + Y n = Z n has no solutions in integers X, Y, Z with XY Z 6= 0. It was pr

WIEFERICH PAST AND FUTURE NICHOLAS M. KATZ 1. The early history Fermat’s Last Theorem (FLT) is the assertion that for n ≥ 3, the equation X n + Y n = Z n has no solutions in integers X, Y, Z with XY Z 6= 0. It was pr

Add to Reading List

Source URL: web.math.princeton.edu

Language: English - Date: 2013-10-15 16:12:04
23Visible Points on Curves over Finite Fields Igor E. Shparlinski Department of Computing, Macquarie University Sydney, NSW 2109, Australia

Visible Points on Curves over Finite Fields Igor E. Shparlinski Department of Computing, Macquarie University Sydney, NSW 2109, Australia

Add to Reading List

Source URL: www.ma.utexas.edu

Language: English - Date: 2007-04-18 20:12:25
24

PDF Document

Add to Reading List

Source URL: static1.squarespace.com

Language: English
25LNCSWallet Databases with Observers

LNCSWallet Databases with Observers

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:06:15
26Fast Computation of Special Resultants ´ Alin Bostan a Philippe Flajolet a Bruno Salvy a Eric Schost b a Algorithms

Fast Computation of Special Resultants ´ Alin Bostan a Philippe Flajolet a Bruno Salvy a Eric Schost b a Algorithms

Add to Reading List

Source URL: www.csd.uwo.ca

Language: English - Date: 2005-07-11 17:31:38
27Master’s thesis in Mathematics  The use of elliptic curves in cryptography by  Gijsbert van Vliet

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2016-04-18 16:34:53
28Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ?  1

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2015-12-08 11:13:38
29Elementary 2-Group Character Codes Cunsheng Ding1 , David Kohel2 , and San Ling3 Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes are analogues of

Elementary 2-Group Character Codes Cunsheng Ding1 , David Kohel2 , and San Ling3 Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes are analogues of

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2012-11-13 10:05:03
30Using mutual proximity for novelty detection in audio music similarity Arthur Flexer? and Dominik Schnitzer Austrian Research Institute for Artificial Intelligence Freyung 6/6, Vienna, Austria

Using mutual proximity for novelty detection in audio music similarity Arthur Flexer? and Dominik Schnitzer Austrian Research Institute for Artificial Intelligence Freyung 6/6, Vienna, Austria

Add to Reading List

Source URL: www.ecmlpkdd2013.org

Language: English - Date: 2013-10-31 16:17:08