language:
Find link is a tool written by Edward Betts.searching for Precomputation 21 found (33 total)
alternate case: precomputation
Badouel intersection algorithm
(60 words)
[view diff]
exact match in snippet
view article
find links to article
intersection of a ray and a triangle in three dimensions without needing precomputation of the plane equation of the plane containing the triangle. Ray-PolygonRainbow table (3,485 words) [view diff] exact match in snippet view article find links to article
random and stored with the password hash. A large salt value prevents precomputation attacks, including rainbow tables, by ensuring that each user's passwordLogjam (computer security) (1,296 words) [view diff] exact match in snippet view article
and reused. The researchers calculated the cost of creating logjam precomputation for one 1024-bit prime at hundreds of millions of USD, and noted thatFunction field sieve (2,658 words) [view diff] exact match in snippet view article find links to article
\alpha _{P}\deg(P)} . The Function Field Sieve algorithm consists of a precomputation where the discrete logarithms of irreducible polynomials of small degreeMöller–Trumbore intersection algorithm (1,566 words) [view diff] exact match in snippet view article find links to article
intersection of a ray and a triangle in three dimensions without needing precomputation of the plane equation of the plane containing the triangle. Among otherDiscrete logarithm (2,043 words) [view diff] exact match in snippet view article find links to article
authors of the Logjam attack estimate that the much more difficult precomputation needed to solve the discrete log problem for a 1024-bit prime wouldBarrett reduction (1,865 words) [view diff] exact match in snippet view article find links to article
it was shown that the full product is unnecessary if we can perform precomputation on one of the operands. We call a function [ ] : R → Z {\displaystyleE0 (cipher) (802 words) [view diff] exact match in snippet view article
about 240 operations. The attack was improved to 237 operations for precomputation and 239 for the actual key search. In 2005, Lu, Meier and Vaudenay publishedDiffie–Hellman key exchange (5,262 words) [view diff] exact match in snippet view article find links to article
estimated by the authors behind the Logjam attack, the much more difficult precomputation needed to solve the discrete log problem for a 1024-bit prime wouldRebound attack (1,939 words) [view diff] exact match in snippet view article find links to article
can be found with a complexity of 28 round transformations due to the precomputation step. The outbound phase completes the differential characteristic inTwofish (839 words) [view diff] exact match in snippet view article find links to article
in hardware for Twofish. An example of such a tradeoff would be the precomputation of round subkeys or s-boxes, which can lead to speed increases of aCube root (1,968 words) [view diff] exact match in snippet view article find links to article
assuming that 1/3a is precomputed, so three iterations plus the precomputation require seven multiplications, three additions, and three divisionsSecurity level (1,338 words) [view diff] exact match in snippet view article find links to article
June 2012). "Non-uniform cracks in the concrete: the power of free precomputation" (PDF). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in ComputerMontgomery modular multiplication (3,847 words) [view diff] exact match in snippet view article find links to article
only place where a direct reduction modulo N is necessary is in the precomputation of R2 mod N. Most cryptographic applications require numbers that areWater jet cutter (4,315 words) [view diff] exact match in snippet view article find links to article
1997, and issued April 6, 1999. Olsen, John H., Motion Control with Precomputation, filed October 7, 1993, and issued April 16, 1996. "SEC Form 8-K". FlowP/poly (1,807 words) [view diff] exact match in snippet view article find links to article
BPP, this also admits the possibility that adversaries can do heavy precomputation for inputs up to a certain length, as in the construction of rainbowDisk encryption theory (3,771 words) [view diff] exact match in snippet view article find links to article
{\displaystyle {\text{GF}}\left(2^{128}\right)} for AES). With some precomputation, only a single multiplication per sector is required (note that additionCrypto Wars (4,057 words) [view diff] exact match in snippet view article find links to article
primes in Diffie–Hellman implementations, and that NSA having done precomputation against those primes in order to break encryption using them in realSteiner tree problem (4,388 words) [view diff] exact match in snippet view article find links to article
1986, Wu et al. improved dramatically on the running time by avoiding precomputation of the all-pairs shortest paths. Instead, they take a similar approachMIFARE (6,850 words) [view diff] exact match in snippet view article find links to article
MIFARE Classic, has instant running time, and does not require a costly precomputation. The new attack allows recovering the secret key of any sector of theDiscrete logarithm records (3,413 words) [view diff] exact match in snippet view article find links to article
1607. Joux, Antoine; Pierrot, Cécile. "Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms" (PDF). Archived