XTR

Results: 836



#Item
301Cryptographic protocols / Key management / Secret sharing / Time complexity / Algorithm / Polynomial / XTR / Theoretical computer science / Applied mathematics / Mathematics

Secret Shared Random Access Machine (Preliminary Version) Shlomi Dolev∗ Yin Li† March 28, 2015 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-28 08:21:27
302Computer programming / Bloom filter / Information science / Hash table / Hash function / Bit array / Set / XTR / Search algorithms / Computing / Hashing

Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams ∗ Sourav Dutta

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-06-29 06:39:15
303Communications protocol / XTR / Transmission Control Protocol / Diffie–Hellman key exchange / Digital signature / Random oracle / Oracle machine / IP / E0 / Cryptography / Cryptographic protocols / Oblivious transfer

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 06:07:01
304XTR / P

Computing in ‘spiral rule’ reaction-diffusion hexagonal cellular automaton Andrew Adamatzky1 and Andrew Wuensche2 1 Faculty of Computing, Engineering and Mathematical Sciences, University of the

Add to Reading List

Source URL: uncomp.uwe.ac.uk

Language: English - Date: 2007-02-18 13:48:28
305Cryptographic hash function / Digital signature / Hash function / XTR / Blind signature / Lamport signature / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-04 13:22:38
306Cryptographic hash function / Digital signature / Hash function / XTR / Blind signature / Lamport signature / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-10 16:54:18
307RSA / Finite fields / Timing attack / Montgomery reduction / David Brumley / Cipher / Dan Boneh / OpenSSL / XTR / Cryptography / Public-key cryptography / Electronic commerce

Computer Networks[removed]–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
308Operations research / Dynamic programming / Routing algorithms / Finite fields / Optimal control / XTR / Sensor / Shortest path problem / Floyd–Warshall algorithm / Mathematics / Theoretical computer science / Applied mathematics

Y:/workspace/work/research/papers/icra11[removed]paper.dvi

Add to Reading List

Source URL: msl.cs.uiuc.edu

Language: English - Date: 2011-10-14 01:37:09
309Mathematics / Modal logic / XTR

A Longitudinal/Cross-Sectional Study of the Impact of Mathematics in Context on Student Mathematical Performance Student Attitude Inventory (Working Paper #7) Mary C. Shafer, Lesley R. Wagner, and Jon Davis

Add to Reading List

Source URL: micimpact.wceruw.org

Language: English - Date: 2005-03-29 15:10:49
310Computational hardness assumptions / Finite groups / Decisional Diffie–Hellman assumption / XDH assumption / XTR / Cyclic group / Subgroup / Group action / BLS / Abstract algebra / Group theory / Algebra

Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman? Stanford University [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-07-03 01:40:38
UPDATE