×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [modular addition]
Scalable Encryption Algorithm
135 views
Program Derivation of Operations in Finite Fields of Prime Order
644 views
School Presentation
185 views
Koc_Arkut
92 views
On-the-fly Verification of Erasure-Encoded File Transfers Mike Freedman & Max Krohn NYU Dept of Computer Science
218 views
Transient simulation of a microburst outflow: Review & proposed new approach May 2006 W.E. LIN PhD Candidate C. NOVACCO MESc Candidate Dr. E. SAVORY Associate
213 views
Core Concepts Dr. Kerry A. McKay 1 Approved for Public Release. Distribution Unlimited 13-1379
218 views
07/16/2013 Attila Altay Yavuz Robert Bosch Research and Technology Center Pittsburgh, PA 15203, USA
[email protected]
Practical Immutable Signature
221 views
Strategies to synchronize biological synthetic networks Giovanni Russo Ph.D. Student University of Naples FEDERICO II Department of Systems and Computer
217 views
DIG 3563 – Information Management Cryptography Lecture 12 Based in part on a lecture by Sarah Adams (Olin College) and Gordon Prichett (Babson College)
216 views
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005
241 views
Security in Computing Chapter 12, Cryptography Explained Part 3
32 views
Next >