Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • {{Short description|Study of the tropical semiring}} ...iscipline of [[idempotent analysis]], '''tropical analysis''' is the study of the [[tropical semiring]]. ...
    2 KB (244 words) - 10:53, 13 January 2024
  • ...{{ISBN|1-58488-127-5}}</ref><ref name="schneier">Bruce Schneier, ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'', pages 463-464, Wiley; 2nd e ...wing [[Python (programming language)|Python]] source code tests a sequence of numbers to determine if it is superincreasing: ...
    2 KB (248 words) - 14:44, 10 February 2025
  • In [[computational complexity theory]] and [[cryptography]], '''averaging argument''' is a standard argument for proving theorems. It ...of the books in a library, then the library has a book, which at least 1/3 of people like. ...
    4 KB (641 words) - 00:21, 17 October 2022
  • In [[cryptography]], the '''hybrid argument''' is a proof technique used to show that two dis ...rint.iacr.org/2004/331.pdf Code-based game-playing proofs and the security of triple encryption.]" Cryptology ePrint Archive (2004)</ref> ...
    4 KB (554 words) - 16:29, 9 July 2024
  • ...air (''x'', ''y'') is then called a ''claw''. Some problems, especially in cryptography, are best solved when viewed as a claw finding problem, hence any algorithm .../math>. So if <math>|A| \cdot |B| \geq |C|</math>, the [[expected number]] of claws is at least 1. ...
    4 KB (581 words) - 08:17, 25 May 2023
  • {{Short description|Number of bits needed to represent an integer datum or message in computing and commu ...sdate=10 Jan 2012}}</ref> as a [[binary number]]. Formally, the bit length of a natural number <math>n \geq 0</math> is ...
    2 KB (306 words) - 12:56, 29 June 2024
  • ...Computer Science, 1982.</ref> against pseudo-random sequences. A sequence of words passes Yao's test if an attacker with reasonable computational power ...collection <math>C=\{C_k\}</math> is a collection of [[boolean circuits]] of size less than <math>P_C(k)</math>. Let <math>p_{k,S}^C</math> be the proba ...
    3 KB (416 words) - 21:47, 18 May 2023
  • *[[Cryptography]] *[[University of Manitoba]] ...
    7 KB (912 words) - 03:01, 24 August 2024
  • ...eems much more difficult<ref name="bonehMultilinear" /> and the security of the proposed candidates is still unclear.<ref name="AlbrechtSite" /> ...s of prime order <math>q</math>, and <math>G_T</math> another cyclic group of order <math>q</math> written multiplicatively. A pairing is a map: <math> e ...
    7 KB (1,053 words) - 19:57, 10 December 2024
  • ...orn 1951, in [[Vermont]]) is an American mathematician at the [[University of Maryland]] who specializes in [[number theory]]. ...[University of Perugia]], [[Nankai University]] and the [[State University of Campinas]]. In 1979–1981 he was a [[Sloan Fellowship|Sloan Fellow]].{{cn|da ...
    5 KB (589 words) - 07:48, 6 May 2024
  • {{Short description|Type of elliptic curve}} ...ralization of [[Hessian curve]]s; they were introduced in [[elliptic curve cryptography]] to speed up the addition and doubling formulas and to have strongly unifi ...
    7 KB (1,032 words) - 20:45, 23 December 2024
  • {{Short description|Theory of cryptography}} ...|The sponge construction for hash functions. ''P<sub>i</sub>'' are blocks of the input string, ''Z<sub>i</sub>'' are hashed output blocks.]] ...
    7 KB (988 words) - 02:38, 6 February 2025
  • ...ithm]] or [[RSA (algorithm)|RSA]]. [[NIST]] has approved specific variants of the Merkle signature scheme in 2020.<ref>{{cite web | url=https://csrc.nist ...isdom.weizmann.ac.il/~naor/PAPERS/uowhf.pdf |journal=[[Symposium on Theory of Computing]] |pages=33–43}}</ref> ...
    8 KB (1,383 words) - 21:07, 21 February 2025
  • [[File:An illustration of the carry-less product.svg|thumb|right|Computing the carry-less product.]] The '''carry-less product''' of two [[binary number]]s ...
    5 KB (799 words) - 07:13, 2 October 2024
  • ...e who have voted. The protocol can be generalized to support a wider range of inputs beyond just the binary values 0 and 1. ...p <math>\scriptstyle G</math> with a generator <math>\scriptstyle g</math> of prime order <math>\scriptstyle q</math> in which the [[discrete logarithm]] ...
    6 KB (930 words) - 21:23, 21 February 2025
  • ...(XOF): it can accept input of any length and process it to produce output of any length. Mask generation functions are completely deterministic: for any ...ring output is completely determined by the input octet string. The output of a mask generation function should be pseudorandom, that is, if the seed to ...
    7 KB (996 words) - 21:03, 8 April 2024
  • In [[cryptography]], the '''Niederreiter cryptosystem''' is a variation of the [[McEliece cryptosystem]] developed in 1986 by [[Harald Niederreiter]]. |journal=Problems of Control and Information Theory. Problemy Upravlenija I Teorii Informacii ...
    5 KB (789 words) - 03:49, 7 July 2023
  • ...fields generated by torsion points. They play a central role in the study of [[counting points on elliptic curves]] in [[Schoof's algorithm]]. The set of division polynomials is a sequence of [[polynomials]] in <math>\mathbb{Z}[x,y,A,B]</math> with <math>x, y, A, B</ ...
    5 KB (844 words) - 14:19, 28 December 2023
  • | known_for = Number Theory, Cryptography, Analysis | employer = Sambalpur University, Sambalpur, Odisha (Former Professor of Mathematics) ...
    5 KB (606 words) - 07:30, 8 December 2024
  • {{Short description|Overview of method used to digitally encrypt data}} ...up addition and certain related operations that are used in elliptic curve cryptography algorithms. ...
    6 KB (855 words) - 10:50, 29 September 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)