You can create a release to package software, along with release notes and links to binary files, for other people to use. Learn more about releases in our docs.
In this paper we bound character sums of the shape ∑ n≤N χ 1 f n χ 2 f n+l , ; where χ1 and χ2 are non-principal multiplicative characters modulo a prime p, f(x) is a real-valued, twice-differentiable ...
Abstract: This paper investigates the feasibility of employing artificial neural network techniques for solving fundamental cryptography problems, taking quadratic residue detection as an example. The ...
Let p be an odd prime. Define $e_{n}=\cases (-1)^{n+\overline{n}}, & \text{if}\ n\ \text{is a quadratic residue mod}\ p\,\\ (-1)^{n+\overline{n}+1}, & \text{if}\ n ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results