搜索结果: 1-9 共查到“step by step”相关记录9条 . 查询时间(0.083 秒)
A Probabilistic Baby-Step Giant-Step Algorithm
Discrete logarithm problem baby-step giant-step algorithm NIST curves over prime fields
2017/2/20
In this paper, a new algorithm to solve the discrete logarithm problem is presented which is similar to the usual baby-step giant-step algorithm. Our algorithm exploits the order of the discrete logar...
Designing Effective Step-By-Step Assembly Instructions
Visualization Assembly Instructions
2016/5/24
We present design principles for creating effective assembly instructions
and a system that is based on these principles. The principles
are drawn from cognitive psychology research which investigat...
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Cryptocurrency smart contracts cybersecurity education
2015/12/30
We document our experiences in teaching smart contract programming to undergraduate
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart
contracts deal dire...
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
baby-step giant-step elliptic curve discrete logarithm negation map
2015/12/29
The negation map can be used to speed up the computation
of elliptic curve discrete logarithms using either the baby-step-giant-step
algorithm (BSGS) or Pollard rho. Montgomery’s simultaneous modula...
Extending Baby-step Giant-step algorithm for FACTOR problem
Baby-step Giant-step algorithm FACTOR problem
2011/2/23
Recently, a non-abelian factorization problem together with an associated asymmetric encryption scheme were introduced in [1]. We show how a classical baby-step giant-step algorithm for discrete logar...
Recently, a non-abelian factorization problem together with an associated asymmetric encryption scheme were introduced in [1]. We show how a classical baby-step giant-step algorithm for discrete logar...
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Human Computer Cryptography Human Identification Protocols Entity Authenticaion
2010/7/13
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocol...
A Training System for Forestry Workers Combining Step-by-step Off-the-job Training and On-the-job Training
forestry conditions OJT step-by-step OffJT training system for forestry workers
2009/8/28
Studies indicate that training for forestry workers should combine on-the-job training (OJT) and step-by-step off-the-job trainig (OffJT). We are interested in designing a training system that constan...
A step-by-step procedure for pH model construction in aquatic systems
step-by-step procedure pH model construction aquatic systems
2010/1/15
We present, by means of a simple example, a comprehensive step-by-step procedure to consistently derive a pH model of aquatic systems. As pH modelling is inherently complex, we make every step of the ...