Skip to Main content Skip to Navigation



 Exact Computing

Consult your copyright


Consulter la politique des éditeurs également sur

Number of Files


Nomber of Notices


Collaborations’ map


Algèbre linéaire exacte Algorithms and containers Triangular set Bornes combinatoires Fully Homomorphic Encryption Encryption switching protocols Algorithmes Modular multiplication Relaxed algorithm Polynomial multiplication Bases d'approximant Journées codage et cryptographie 2014 Arithmétique modulaire Algorithme Hankel matrix Mixed-radix number system In-place algorithm Double-base representation Multiplication of power series Mixed Integer Linear Programming Cofactorization Minimal basis Analyse Order basis Middle product Lefèvre algorithm Matrix multiplication algorithms Implementation Elementary function Order bases Control flow divergence Polynomial root finding Algorithm Computation on polynomials Bootstrapping Cutting Strategy Hensel lifting Complexity Analysis Design of algorithms SIMD Mathemagix Collision Attacks Hamming distance LinBox Pell-Fermat equation Bivariate polynomial systems Correlation Electromagnetic Analysis Arithmetic Covering systems of congruences Integer matrix multiplication Dataflow Parallelism Graeffe transform Exact linear algebra Exponentiation Clustering Algorithms GPU computing RSA Arithmétique en place Computations on polynomials Correlation electromagnetic analysis Electromagnetic Analysis Linear code P-Adic integer Arithmetic complexity Twisted Edwards curve Malicious adversary Digital straight segment recognition Cauchy matrices Floating-point arithmetic OpenCL Correct rounding Polynomial Solving CADO-NFS Randomized algorithms Minimal approximant basis Online algorithm Montgomery Exponentiation FFT Montgomery curve In-place arithmetic Linear system solving Side-channel attacks Benchmarking Certification Scalar multiplication Complexity Asymptotics Finite fields Polynomial matrix Domain Specific Language Deterministic algorithm Coding and cryptography days 2014 Modular composition Elliptic curve method Finite field Discrete circle Matrix polynomial Homomorphic encryption Non-linear code Design pattern