117 results on '"Bonnecaze, Alexis"'
Search Results
2. Multiplication in finite fields with Chudnovsky-type algorithms on the projective line
3. Optimization of the scalar complexity of Chudnovsky$^2$ multiplication algorithms in finite fields
4. Polynomial Constructions of Chudnovsky-type Algorithms for Multiplication in Finite Fields with Linear Bilinear Complexity
5. The build-up construction over a commutative non-unital ring
6. Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields
7. Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
8. On The Effective Construction of Asymmetric Chudnovsky Multiplication Algorithms in Finite Fields Without Derivated Evaluation
9. On Chudnovsky-Based Arithmetic Algorithms in Finite Fields
10. Blind Transfer of Personal Data Achieving Privacy
11. Optimization of the scalar complexity of Chudnovsky2 multiplication algorithms in finite fields
12. Quasi type IV codes over a non-unital ring
13. On the Scalar Complexity of Chudnovsky Multiplication Algorithm in Finite Fields
14. On the construction of elliptic Chudnovsky-type algorithms for multiplication in large extensions of finite fields
15. Preface
16. ARITHMETIC IN FINITE FIELDS BASED ON THE CHUDNOVSKY-CHUDNOVSKY MULTIPLICATION ALGORITHM
17. On the construction of the asymmetric Chudnovsky multiplication algorithm in finite fields without derivated evaluation
18. Blind Transfer of Personal Data Achieving Privacy
19. Effective arithmetic in finite fields based on Chudnovsky's multiplication algorithm
20. On the Scalar Complexity of Chudnovsky $$^2$$ Multiplication Algorithm in Finite Fields
21. New models for efficient authenticated dictionaries
22. Authenticated Dictionary Based on Frequency
23. A strategy to optimize the complexity of Chudnovsky-type algorithms over the projective line
24. Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
25. A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
26. Code Based Secret Sharing Schemes
27. Code Based Secret Sharing Schemes
28. Quaternary constructions of formally self-dual binary codes and unimodular lattices
29. CONSTRUCTION OF ASYMMETRIC CHUDNOVSKY ALGORITHMS WITHOUT DERIVATED EVALUATION FOR MULTIPLICATION IN FINITE FIELDS
30. AES side-channel countermeasure using random tower field constructions
31. Threshold signature for distributed time stamping scheme
32. Authenticated Dictionary Based on Frequency
33. Secure time-stamping schemes: a distributed point of view
34. Type IV codes over a non-unital ring
35. The build-up construction of quasi self-dual codes over a non-unital ring
36. Cubic self-dual binary codes
37. The build-up construction of quasi self-dual codes over a non-unital ring.
38. Type IV codes over a non-unital ring.
39. Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
40. Jacobi Polynomials, Type II Codes, and Designs
41. A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
42. Type IV codes over a non-local non-unital ring
43. Quasi self-dual codes over non-unital rings of order six
44. A New Secret Sharing Scheme Based on Polynomials over Finite Fields
45. Une formation d'ingénieurs dédiée à des personnes en situation de handicap
46. Type II codes over Z4
47. Quaternary quadratic residue codes and unimodular lattices
48. Quaternary constructions of formally self-dual binary codes and unimodular lattices
49. Optimization of the scalar complexity of Chudnovsky2 multiplication algorithms in finite fields.
50. On the construction of the asymmetric Chudnovsky multiplication algorithm in finite fields without derivated evaluation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.