Compare Prices & Save - The Ultimate Deal Finder

Check real-time prices from top retailers in seconds.
Secure unbeatable deals, time after time!

Compare from

and many more!

Milestones in Drug Therapy: Cryptography and Computational Number Theory (Hardcover)

Milestones in Drug Therapy: Cryptography and Computational Number Theory (Hardcover)

By Walmart

0 (0No reviews yet)

Out of Stock

Price last updated : Aug 10, 2024 11:39 PM

image
View Deals
    (AI feature in beta)

    Loading store availability...

    In Stock:
    Sort:
    No products in stock, please try other options.

      Price History

      • $ 93.22Lowest Price
      • $ 108.76Highest Price
      • $ 93.22Current Price
      Loading...
      Loading price history chart...

    Product details

    Milestones in Drug Therapy: Cryptography and Computational Number Theory (Hardcover)

    product_image

    Computational Number Theory.- On the Dimension and the Number of Parameters of a Unirational Variety.- On Elements of High Order in Finite Fields.- Counting the Number of Points on Affine Diagonal Curves.- Small Values of the Carmichael Function and Cryptographic Applications.- Density Estimates Related to Gauss Periods.- Distribution of the Coefficients of Primitive Polynomials over Finite Fields.- The Distribution of the Quadratic Symbol in Function Fields and a Faster Mathematical Stream Cipher.- Rational Groups of Elliptic Curves Suitable for Cryptography.- Effective Determination of the Proportion of Split Primes in Number Fields.- Algorithms for Generating, Testing and Proving Primes: A Survey.- Elliptic Curve Factorization Using a "Partially Oblivious" Function.- The Hermite-Serret Algorithm and 122 + 332.- Applications of Algebraic Curves to Constructions of Sequences.- Cryptography.- Designated 2-Verifier Proofs and their Application to Electronic Commerce.- Divide and Conquer Attacks on Certain Irregularly Clocked Stream Ciphers.- New Results on the Randomness of Visual Cryptography Schemes.- Authentication - Myths and Misconceptions.- A Survey of Bit-security and Hard Core Functions.- On the Security of Diffie-Hellman Bits.- Polynomial Rings and Efficient Public Key Authentication II.- Security of Biased Sources for Cryptographic Keys.- Achieving Optimal Fairness from Biased Coinflips.- The Dark Side of the Hidden Number Problem: Lattice Attacks on DSA.- Distribution of Modular Sums and the Security of the Server Aided Exponentiation.- A General Construction for Fail-Stop Signatures using Authentication Codes.- Robust Additive Secret Sharing Schemes over Zm.- RSA Public Key Validation.

    Customer Reviews

    0 of 5

    0 customer reviews

    Write a Review

    To leave a review please Sign Up or Log In

    Similar products

    Meet The First AI Shopping Chatbot

    Your 24/7 Smart Assistant. Now in Beta!

    Finding products has never been so easy

    Idea suggestions and decisions

    Price comparisons and alerts

    Recommended

    Apple iPhone 15 Pro

    for the best prices!

    iPhone