4153 - 4164 of 18324 Results
Format results
Effective Field Theory of Echoes
Cliff Burgess McMaster University
On Quantum Attacks to the Code-Equivalence Problem
Edoardo Persichetti, Florida Atlantic UniversityDrinfeld Modules are not for Isogeny Based Cryptography
Antoine Joux, Institut de Mathématiques de JussieuOverview of Multi-Variate Function Based Public-Key Cryptography and Cryptanalysis
Jintai Ding, Unviersity of CincinnatiUsing Kuperberg's Collimation Sieve to Attack CSIDH
Chris Peikert, University of Michigan, Ann ArborEchoes in Numerical Relativity
Qingwen Wang Scotiabank
Overview of Attacks on Elliptic Curve Isogenies Based Systems
Chloe Martindale, University of BristolEchoes and Holography
Krishan Saraswat University of California, Santa Barbara
Overview of Elliptic Curve Isogenies Based Public Key Cryptography Assumptions
David Jao, University of WaterlooPSI 2019/2020 - Computational Physics - Lecture 10
Erik Schnetter Perimeter Institute for Theoretical Physics