On the calculation of elliptic integrals of the second and third kinds
E. Neuman (1969)
Applicationes Mathematicae
Similarity:
E. Neuman (1969)
Applicationes Mathematicae
Similarity:
J. Krużelecki, M. Życzkowski (1978)
Applicationes Mathematicae
Similarity:
Maurer, Markus, Müller, Volker (2001)
Experimental Mathematics
Similarity:
Antonio Corbo Esposito, Cristian Tirelli (2019)
Rendiconto dell’Accademia delle Scienze Fisiche e Matematiche
Similarity:
We provide the basic definitions regarding computational complexity theory and review some basic cryptography protocols based on RSA or elliptic curves. These protocols summarize the history of the last fifty years in cryptography and are actually ubiquitous in applications, as for example SSL (secure socket layers), smartcards, creation of a bitcoin wallet etc. Since it is known they are in the polynomial class for the Shor’s algorithm, the possible development of quantum computers, needed...
Cayley (1877)
Mathematische Annalen
Similarity:
B.C. Carlson (1979)
Numerische Mathematik
Similarity:
Cayley (1877)
Mathematische Annalen
Similarity:
K. I. Iordanidis (1971)
Δελτίο της Ελληνικής Μαθηματικής Εταιρίας
Similarity:
Nazarov, A.I. (2004)
Journal of Mathematical Sciences (New York)
Similarity:
Devdariani, G. (2000)
Bulletin of TICMI
Similarity:
Barry F. Smith (1991/92)
Numerische Mathematik
Similarity: