index - Exact Computing Access content directly



 Exact Computing

Consult your copyright

Number of Files


Nomber of Notices


Collaborations’ map


FFT Computations on polynomials Algebraic Coding Theory Database query evaluation and containment Complexity Information inequalities Supersingular isogeny Diffie-Hellman Arithmétique polynomiale Class groups of quadratic imaginary number fields Arithmetic circuits Algorithm Polynomial Modular Number System Correlation Electromagnetic Analysis Finite field Analyse Algèbre linéaire exacte Conditional independence structures Cauchy interpolation with poles Certification Finite fields Scalar multiplication Functional encryption for inner products Floating-point arithmetic CADO-NFS Randomized algorithms Double-base representation Linearly homomorphic encryption Design of algorithms SIMD Bornes combinatoires Polynomial root finding Cryptography based on class groups of an imaginary quadratic field Arithmetic complexity Algorithmes Class group cryptography Error correcting codes Exact linear algebra Bootstrapping Montgomery curve Asymptotics Computer algebra Coding and cryptography days 2014 Complexity theory Circuits arithmétiques Design pattern Covering systems of congruences Benchmarking Control flow divergence Computer Algebra Arithmétique en place Elementary function Twisted Edwards curve Graeffe transform Bivariate polynomial systems Mixed-radix number system Cauchy matrices Bases d'approximant EC-DSA Complexity Analysis Algèbre linéaire Class Groups Cofactorization Algorithme Cryptographic primitives Arithmetic Triangular set Correlation electromagnetic analysis Discrete circle Arithmétique modulaire Domain Specific Language Online algorithm Expander mixing lemma Collision Attacks Digital straight segment recognition Simultaneous rational function reconstruction Class groups of quadratic fields Polynomial multiplication Digital Signatures Communication complexity Fully Homomorphic Encryption Deterministic algorithm Electromagnetic Analysis Computation on polynomials Cutting Strategy Cryptosystem Algorithms and containers Efficient arithmetic Codes correcteurs d'erreurs Side-channel attacks Relaxed algorithm Elliptic curve method Exponentiation Calcul formel Encryption switching protocols GPU computing Decision problems Dataflow Parallelism RSA Clustering Algorithms Correct rounding