index - Archive ouverte HAL Access content directly



 Exact Computing

Consult your copyright

Number of Files


Nomber of Notices


Collaborations’ map


Implementation library Error correcting codes Elliptic curve method Algorithm Arithmétique en place GPU computing Digital straight segment recognition Electromagnetic Analysis Hankel matrix Bootstrapping Arithmetic Complexity In-place algorithm Correct rounding Supersingular isogeny Diffie-Hellman Bornes combinatoires Complexity Analysis Covering systems of congruences Discrete circle Hamming distance Graeffe transform Polynomial root finding Class Groups Floating-point arithmetic Cutting Strategy Cryptosystem In-place arithmetic FFT Exact linear algebra Asymptotics Calcul formel Computations on polynomials Linear code Functional encryption for inner products Coding and cryptography days 2014 Class groups of quadratic fields Mixed-radix number system Correlation Electromagnetic Analysis Cryptographic primitives Cauchy matrices Domain Specific Language Analyse Online algorithm Double-base representation Montgomery curve Interleaved Reed Solomon codes Design pattern Elementary function Randomized algorithms Dataflow Parallelism Computer Algebra Homomorphic encryption Polynomial multiplication CADO-NFS Class groups of quadratic imaginary number fields Integer matrix multiplication Class group cryptography Bivariate polynomial systems Efficient arithmetic Clustering Algorithms Scalar multiplication Journées codage et cryptographie 2014 Fully Homomorphic Encryption Triangular set Design of algorithms Algorithmes Algorithme Finite field Correlation electromagnetic analysis Finite fields Linearly homomorphic encryption Algèbre linéaire exacte Collision Attacks Arithmetic complexity Exponentiation Algorithms and containers Polynomial Modular Number System Lefèvre algorithm Hensel lifting Encryption switching protocols Arithmétique modulaire Cryptography based on class groups of an imaginary quadratic field SIMD Implementation Control flow divergence Certification Deterministic algorithm Bases d'approximant Algebraic Coding Theory Side-channel attacks EC-DSA LinBox Relaxed algorithm Digital Signatures Cofactorization Computation on polynomials Codes correcteurs d'erreurs RSA Benchmarking Twisted Edwards curve