Skip to Main content Skip to Navigation



 Exact Computing

Consult your copyright

Number of Files


Nomber of Notices


Collaborations’ map


Design of algorithms Arithmetic complexity Homomorphic encryption Complexity Analysis Arithmétique modulaire Benchmarking Relaxed algorithm Journées codage et cryptographie 2014 Arithmétique en place Correlation Electromagnetic Analysis Lefèvre algorithm Linear code Digital straight segment recognition Algorithms and containers Minimal approximant basis Algorithm Modular composition Exponentiation Design pattern Error correcting codes Computations on polynomials Bootstrapping Algorithmes Hensel lifting Bivariate polynomial systems Cutting Strategy Collision Attacks Coding and cryptography days 2014 Algorithme Cofactorization RSA Supersingular isogeny Diffie-Hellman Side-channel attacks Deterministic algorithm LinBox Correlation electromagnetic analysis Hankel matrix Efficient arithmetic Polynomial Modular Number System Multiplication of power series Linear system solving Mixed Integer Linear Programming Integer matrix multiplication Elliptic curve method Polynomial root finding Matrix multiplication algorithms CADO-NFS Clustering Algorithms Minimal basis Control flow divergence Online algorithm Montgomery Exponentiation Bornes combinatoires Double-base representation Cauchy matrices Correct rounding Arithmetic Dataflow Parallelism Covering systems of congruences Triangular set Fully Homomorphic Encryption Algèbre linéaire exacte Exact linear algebra Finite fields Finite field Certification Mixed-radix number system Codes correcteurs d'erreurs Domain Specific Language In-place algorithm Polynomial multiplication Scalar multiplication Elementary function Encryption switching protocols Modular multiplication Floating-point arithmetic Discrete circle SIMD Matrix polynomial Randomized algorithms Mathemagix Complexity Bases d'approximant Montgomery curve In-place arithmetic GPU computing Hamming distance Asymptotics Electromagnetic Analysis Analyse Algebraic Coding Theory Implementation Computer Algebra Computation on polynomials Twisted Edwards curve FFT Graeffe transform Calcul formel Malicious adversary Middle product