Sciweavers

8 search results - page 2 / 2
» An Extension of Kedlaya's Algorithm to Hyperelliptic Curves ...
Sort
View
AAECC
2005
Springer
99views Algorithms» more  AAECC 2005»
13 years 5 months ago
Formulae for Arithmetic on Genus 2 Hyperelliptic Curves
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete logarithm problem. In this article we present explicit formulae to perform the gro...
Tanja Lange
ACISP
2005
Springer
13 years 7 months ago
Redundant Trinomials for Finite Fields of Characteristic 2
Abstract. In this article we introduce redundant trinomials to represent elements of finite fields of characteristic 2. This paper develops applications to cryptography, especial...
Christophe Doche
ADMA
2005
Springer
157views Data Mining» more  ADMA 2005»
13 years 11 months ago
Learning k-Nearest Neighbor Naive Bayes for Ranking
Accurate probability-based ranking of instances is crucial in many real-world data mining applications. KNN (k-nearest neighbor) [1] has been intensively studied as an effective c...
Liangxiao Jiang, Harry Zhang, Jiang Su