Sciweavers

7 search results - page 2 / 2
» jal 1998
Sort
View
JAL
1998
74views more  JAL 1998»
13 years 7 months ago
A Survey of Fast Exponentiation Methods
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this expon...
Daniel M. Gordon
JAL
1998
85views more  JAL 1998»
13 years 7 months ago
Isomorph-Free Exhaustive Generation
We describe a very general technique for generating families of combinatorial objects without isomorphs. It applies to almost any class of objects for which an inductive construct...
Brendan D. McKay