>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到MOD相关记录38条 . 查询时间(0.046 秒)
Current estimation techniques for the probability of decryption failures in Ring/Mod-LWE/LWR based schemes assume independence of the failures in individual bits of the transmitted message to calculat...
Most multi-party computation protocols allow secure computation of arithmetic circuits over a finite field, such as the integers modulo a prime. In the more natural setting of integer computations mod...
Computing Mod Without Mod     mod  modulo  modulus       2016/1/7
Encryption algorithms are designed to be difficult to break without knowledge of the secrets or keys. To achieve this, the algorithms require the keys to be large, with some algorithms having a reco...
In this paper, we investigate some statistical properties of multiplication mod 2n for cryptographic use. For this purpose, we introduce a family of T-functions similar to modular multiplication, wh...
Let E be an elliptic curve over the rationals that does not have complex multiplication. For each prime `, the action of the absolute Galois group on the `-torsion points of E can be given in terms of...
The lead digit behavior of a large class of arithmetic sequences is de- termined by using results from the theory of uniform distribution mod I. Theory for triangular arrays is developed and appli...
Let l=3 or 5. For any integer n>1, we produce an infinite set of triples (L, E1, E2), where L is a number field with degree l 3(n&1) over Q and E1 and E2 are elliptic curves over L with distinct j-...
This study examines how different microphysical parameterization schemes influence orographically induced precipitation and the distributions of hydrometeors and water vapour for midlatitude s...
Let $N_1=p_1q_1$ and $N_2=p_2q_2$ be two different RSA moduli. Suppose that $p_1=p_2 \bmod 2^t$ for some $t$, and $q_1$ and $q_2$ are $\alpha$ bit primes. Then May and Ritzenhofen showed that $N_1$ an...
We present an r-th root extraction algorithm over a finite field F_q. Our algorithm precomputes a primitive r^s-th root of unity where s is the largest positive integer satisfying r^s| q-1, and is app...
We present a square root algorithm in F_q which generalizes Atkins's square root algorithm for q=5(mod 8) and Kong et al.'s algorithm for q=9(mod 16) Our algorithm precomputes a primitive 2^s-th root ...
2012年3月30日中午,梅赛德斯-奔驰中国国际时装周•2012/2013秋冬系列期间,中国服装设计师协会与法国女装成衣协会FédérationFrançaiseduPrêtàPorterFéminin在北京饭店联合主办新闻发布会暨中法时装业和时尚教育业合作签字仪式,中国服装设计师协会主席李当岐先生与法国女装成衣协会主席Jean-PierreMOCHO先生宣布中法时装业将...
We propose a new modularity optimization method, Mod-CSA, based on stochastic global optimization algorithm, conformational space annealing (CSA). Our method outperforms simulated annealing in terms o...
When secure arithmetic is required, computation based on secure multiplication ($\MULT$) is much more efficient than computation based on secure boolean circuits. However, a typical application can al...
Abstract: Using Fourier analysis, we study local limit theorems in weak-convergence problems. Among many applications, we discuss random matrix theory, some probabilistic models in number theory, the ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...