To see the other types of publications on this topic, follow the link: Curve-key.

Books on the topic 'Curve-key'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 books for your research on the topic 'Curve-key.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Menezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Menezes, A. J. Elliptic curve public key cryptosystems. Boston: Kluwer Academic Publishers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Menezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993. http://dx.doi.org/10.1007/978-1-4615-3198-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elliptic Curve Public Key Cryptosystems. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.

Full text
Abstract:
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.
APA, Harvard, Vancouver, ISO, and other styles
6

Harrison, Mark. Normal distribution. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198765875.003.0063.

Full text
Abstract:
This chapter describes normal distribution as it applies to Emergency Medicine, and in particular the Primary FRCEM examination. The chapter outlines the key details of the bell-shaped curve, standard deviation, and confidence intervals. This chapter is laid out exactly following the RCEM syllabus, to allow easy reference and consolidation of learning.
APA, Harvard, Vancouver, ISO, and other styles
7

Hrushovski, Ehud, and François Loeser. Curves. Princeton University Press, 2017. http://dx.doi.org/10.23943/princeton/9780691161686.003.0007.

Full text
Abstract:
This chapter proves the iso-definability of unit vector C when C is a curve using Riemann-Roch. Recall that a pro-definable set is called iso-definable if it is isomorphic, as a pro-definable set, to a definable set. If C is an algebraic curve defined over a valued field F, then unit vector C is an iso-definable set. The topology on unit vector C is definably generated, that is, generated by a definable family of (iso)-definable subsets. In other words, there is a definable family giving a pre-basis of the topology. The chapter explains how definable types on C correspond to germs of paths on unit vector C. It also constructs the retraction on skeleta for curves. A key result is the finiteness of forward-branching points.
APA, Harvard, Vancouver, ISO, and other styles
8

F, Blake Ian, Seroussi G. 1955-, and Smart Nigel P. 1967-, eds. Advances in elliptic curve cryptography. Cambridge, UK: Cambridge University Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guide to Elliptic Curve Cryptography (Springer Professional Computing). Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

(Editor), Ian F. Blake, Gadiel Seroussi (Editor), and Nigel P. Smart (Editor), eds. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). 2nd ed. Cambridge University Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Scheel, John R., and Diana L. Lam. Enhancing Mass on MRI. Edited by Christoph I. Lee, Constance D. Lehman, and Lawrence W. Bassett. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190270261.003.0032.

Full text
Abstract:
The ACR BI-RADS Atlas defines a “mass” on MRI as a space-occupying lesion with convex borders. Masses are characterized by their morphology and their internal enhancement characteristics. Mass morphology descriptor categories include shape (oval, round, irregular), margins (circumscribed, irregular, spiculated), and internal enhancement (homogeneous, heterogeneous, rim enhancement, dark internal septations). Suspicious morphology descriptors of MRI masses include irregular shape, irregular or spiculated margins, and heterogeneous internal enhancement. This chapter, appearing in the section on asymmetry, mass, and distortion, reviews the key imaging and clinical features, imaging protocols, differential diagnoses, and management recommendations for an enhancing mass on MRI. Topics discussed include characteristics of benign and malignant masses, classic benign masses, and enhancement curve assessment.
APA, Harvard, Vancouver, ISO, and other styles
12

Walsh, Anthony, and Cody Jorgensen. Evolutionary Theory and Criminology. Edited by Rosemary L. Hopcroft. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190299323.013.35.

Full text
Abstract:
Evolutionary criminology is part of a broader biosocial approach to criminology. The evolutionary perspective can help organize the hodgepodge of extant, and often contradictory, criminological theories in a coherent way, thus providing a more robust explanation of criminality. This chapter demonstrates the relevance of evolutionary theory to criminology, discusses the evolutionary origins of both prosocial and antisocial traits, and shows that evolutionary theory is invaluable to understanding two key issues that have been impervious to solution using the standard social science model—the sex ratio in criminal offending and the age–crime curve. The chapter also provides a discussion on the distal causes of traits conducive to criminal behavior as well as a Darwinian explanation of why humans can be altruistic toward some humans yet victimize others.
APA, Harvard, Vancouver, ISO, and other styles
13

Lugo, Stefano, and Fabio Bertoni. The Use of Debt by Sovereign Wealth Funds. Edited by Douglas Cumming, Geoffrey Wood, Igor Filatotchev, and Juliane Reinecke. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198754800.013.6.

Full text
Abstract:
This chapter documents the use of debt capital by sovereign wealth funds (SWFs)—a growing and under-researched phenomenon. Three reasons are given for this. First: debt can help SWFs reach their target portfolio size. (Some do not receive regular inflows from their governments to increase their assets under management (AUM). Second: the development of capital markets is a key objective for most of the countries that have created an SWF, and debt may be especially useful for the development of the bond market. SWF bonds are quasi-governmental securities that can be used as collateral and create a reference yield curve. Third: the use of debt capital is particularly appropriate for portfolio SWFs investing in concentrated portfolios of selected companies for strategic and financial reasons. SWFs are more likely to use debt when they are non-commodity-based, come from countries with relatively less developed bond markets, and have a strategic investment style.
APA, Harvard, Vancouver, ISO, and other styles
14

Lattman, Eaton E., Thomas D. Grant, and Edward H. Snell. Shape Reconstructions from Small Angle Scattering Data. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199670871.003.0004.

Full text
Abstract:
This chapter discusses recovering shape or structural information from SAXS data. Key to any such process is the ability to generate a calculated intensity from a model, and to compare this curve with the experimental one. Models for the particle scattering density can be approximated as pure homogenenous geometric shapes. More complex particle surfaces can be represented by spherical harmonics or by a set of close-packed beads. Sometimes structural information is known for components of a particle. Rigid body modeling attempts to rotate and translate structures relative to one another, such that the resulting scattering profile calculated from the model agrees with the experimental SAXS data. More advanced hybrid modelling procedures aim to incorporate as much structural information as is available, including modelling protein dynamics. Solutions may not always contain a homogeneous set of particles. A common case is the presence of two or more conformations of a single particle or a mixture of oligomeric species. The method of singular value decomposition can extract scattering for conformationally distinct species.
APA, Harvard, Vancouver, ISO, and other styles
15

Hahn, Robert G. Intravenous fluids in anaesthetic practice. Edited by Michel M. R. F. Struys. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780199642045.003.0020.

Full text
Abstract:
Infusion fluids may be regarded as drugs in the perioperative setting. The therapeutic effects of crystalloid solutions are strongly related to the administered volume, while fluids of the colloid type may also improve microcirculation and have anti-inflammatory properties. The anaesthetist should be able to handle all available infusion fluids and be aware of their benefits, limitations, and risks. Fluid administration programmes for surgery are traditionally based on a balance method in which perceived and measured losses are continuously replaced. Two outcome-guided approaches—restrictive and goal-directed fluid therapy—have been added in recent years. The latter places all patients on the top of the Frank–Starling curve by titrating repeated bolus infusions of colloid fluid while observing the stroke volume response. Areas where special consideration should be given to fluid therapy include burn injury, children, day surgery, endoscopic surgery, neurosurgery, induction of spinal and epidural anaesthesia, and in septic and trauma-related shock. As volume is the key component of infusion fluids, kinetic analysis of their disposition is based on their dilution effect on components already present in the blood, usually haemoglobin.
APA, Harvard, Vancouver, ISO, and other styles
16

Attanasio, John. Politics and Capital. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190847029.001.0001.

Full text
Abstract:
This book is about good government, especially an ethical and fair government and constitution. It has five key ideas. Understanding these ideas is critical to addressing the problems besetting the American political and economic systems. First, the book proposes the new principle of distributive autonomy to guarantee first-order rights. The principle sharply contrasts with modern, individualistic libertarian ideas. Good governance must be centrally concerned with the distribution of freedom for all. If your own autonomy matters, so does everyone else’s. Valuing the autonomy of others is authentic autonomy. A core aspect of ethical governance must value the autonomy of everyone. Second, the book demonstrates how the campaign finance cases violate distributive autonomy and completely subvert the American system of government. Third, the book deploys Thomas Piketty’s data to correlate the campaign finance cases with the dramatic rise in wealth and particularly income inequality in the United States. Fourth, the book demonstrates that the distorted allocation of income has adversely affected the centrally important demand curve of the American economy, which may be helping to drive economic stagnation and the debt overhang. Fifth, the book concludes that political freedom, in the sense of distributive autonomy, is necessary for participatory democracy and that participatory democracy may be a necessary condition to sustain long-term, prosperous capitalism.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography