Nombre de Fichiers déposés

27

ECO

 Exact Computing

Consultez vos droits d'auteur

 
     

Consulter la politique des éditeurs également sur

Nombre de Notices déposées

14

Tags

Upper bound RSA Certification Cutting Strategy Théorie de codes correcteurs Computations on polynomials Randomized Exponentiation Clustering Algorithms Homomorphic encryption Algorithms and containers Polynomial multiplication Non-linear code Sparse linear algebra Domain Specific Language Design pattern Bornes combinatoires Scalar multiplication Minimal approximant basis Probabilistic certification Linear system solving Power series Electromagnetic Analysis Univariate representation Modular composition Montgomery Exponentiation Exponentiation FFT Finite field Structured matrix Systematic code Fully Homomorphic Encryption Bivariate polynomial systems Bootstrapping Linear code Matrix multiplication algorithms RNS Relaxed algorithm Triangular set Two-party computation LinBox P-Adic integer Order basis Finite fields Shared Memory Parallelism Collision Attacks Exact linear algebra Online algorithm Produit matrice creuse Complexity Dataflow Parallelism Arithmetic Deterministic algorithm Residue Number System Analyse Mixed-radix number system Single-Execution Attacks Secure IC Graeffe transform Cauchy matrices Design of algorithms Arithmetic complexity Middle product Correlation Electromagnetic Analysis Polynomial Solving Side channel Mathemagix Journées codage et cryptographie 2014 SpMV Minimal basis Hensel lifting Implementation Coding and cryptography days 2014 Mixed Integer Linear Programming Computation on polynomials Covering systems of congruences Polynomial system solving Vecteur Correlation electromagnetic analysis Complexity Analysis TFT Probabilistic algorithm Side-channel attacks Algorithm Unsupervised Learning Benchmarking Multiplication of power series Symmetric polynomial Hamming distance Grenoble Encryption switching protocols Randomized algorithms Hankel matrix Polynomial matrix Matrix polynomial Truncated product Theory of computation Toeplitz Matrix Polynomial root finding Malicious adversary