- Collectibles
- Crypto
- Milestones in Drug Therapy: Cryptography and Computational Number Theory (Hardcover)
Milestones in Drug Therapy: Cryptography and Computational Number Theory (Hardcover)
Out of Stock
Price last updated : Aug 10, 2024 11:39 PM
Loading store availability...
- $ 93.22Lowest Price
- $ 108.76Highest Price
- $ 93.22Current Price
Price History
Product details
Milestones in Drug Therapy: Cryptography and Computational Number Theory (Hardcover)
Computational Number Theory.- On the Dimension and the Number of Parameters of a Unirational Variety.- On Elements of High Order in Finite Fields.- Counting the Number of Points on Affine Diagonal Curves.- Small Values of the Carmichael Function and Cryptographic Applications.- Density Estimates Related to Gauss Periods.- Distribution of the Coefficients of Primitive Polynomials over Finite Fields.- The Distribution of the Quadratic Symbol in Function Fields and a Faster Mathematical Stream Cipher.- Rational Groups of Elliptic Curves Suitable for Cryptography.- Effective Determination of the Proportion of Split Primes in Number Fields.- Algorithms for Generating, Testing and Proving Primes: A Survey.- Elliptic Curve Factorization Using a "Partially Oblivious" Function.- The Hermite-Serret Algorithm and 122 + 332.- Applications of Algebraic Curves to Constructions of Sequences.- Cryptography.- Designated 2-Verifier Proofs and their Application to Electronic Commerce.- Divide and Conquer Attacks on Certain Irregularly Clocked Stream Ciphers.- New Results on the Randomness of Visual Cryptography Schemes.- Authentication - Myths and Misconceptions.- A Survey of Bit-security and Hard Core Functions.- On the Security of Diffie-Hellman Bits.- Polynomial Rings and Efficient Public Key Authentication II.- Security of Biased Sources for Cryptographic Keys.- Achieving Optimal Fairness from Biased Coinflips.- The Dark Side of the Hidden Number Problem: Lattice Attacks on DSA.- Distribution of Modular Sums and the Security of the Server Aided Exponentiation.- A General Construction for Fail-Stop Signatures using Authentication Codes.- Robust Additive Secret Sharing Schemes over Zm.- RSA Public Key Validation.
Customer Reviews
0 of 5
0 customer reviews
Write a Review
To leave a review please Sign Up or Log In
Similar products
Meet The First AI Shopping Chatbot
Your 24/7 Smart Assistant. Now in Beta!
Finding products has never been so easy
Idea suggestions and decisions
Price comparisons and alerts
Recommended
Apple iPhone 15 Pro
for the best prices!
Subscribe Now
Join us and get all the latest news, trends and offers straight to your inbox.