FLASH
From MaRDI portal
Software:14777
No author found.
Related Items (49)
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme ⋮ Practical Cryptanalysis of k-ary $$C^*$$ ⋮ A new perturbation algorithm and enhancing security of SFLASH signature scheme ⋮ A novel high-order, entropy stable, 3D AMR MHD solver with guaranteed positive pressure ⋮ The Shortest Signatures Ever ⋮ MI-T-HFE, A New Multivariate Signature Scheme ⋮ Development and validation of a chemical reaction solver coupled to the FLASH code for combustion applications ⋮ Parallel Navier-Stokes simulations for high speed compressible flow past arbitrary geometries using FLASH ⋮ On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\) ⋮ Unnamed Item ⋮ Cryptographic Hardware and Embedded Systems - CHES 2004 ⋮ On methods of shortening ElGamal-type signatures ⋮ Ideal GLM-MHD: about the entropy consistent nine-wave magnetic field divergence diminishing ideal magnetohydrodynamics equations ⋮ A solution accurate, efficient and stable unsplit staggered mesh scheme for three dimensional magnetohydrodynamics ⋮ Cross-code comparisons of mixing during the implosion of dense cylindrical and spherical shells ⋮ Unnamed Item ⋮ Efficient public-key operation in multivariate schemes ⋮ Unnamed Item ⋮ A family of weak keys in HFE and the corresponding practical key-recovery ⋮ Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH ⋮ A numerical method for shock driven multiphase flow with evaporating particles ⋮ Computational Frameworks for Advanced Combustion Simulations ⋮ Revisiting the Cubic UOV Signature Scheme ⋮ Programming matrix algorithms-by-blocks for thread-level parallelism ⋮ Information and Communications Security ⋮ Poly-Dragon: an efficient multivariate public key cryptosystem ⋮ Information Security and Privacy ⋮ Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme ⋮ Public Key Cryptography - PKC 2005 ⋮ Public Key Cryptography - PKC 2005 ⋮ Information Security and Cryptology - ICISC 2003 ⋮ A uniquely defined entropy stable matrix dissipation operator for high Mach number ideal MHD and compressible Euler simulations ⋮ Selecting Parameters for the Rainbow Signature Scheme ⋮ Numerical methods of solving equations of hydrodynamics from perspectives of the code FLASH ⋮ Cryptanalysis of SFLASH with Slightly Modified Parameters ⋮ Rainbow, a New Multivariable Polynomial Signature Scheme ⋮ A Fast and Secure Implementation of Sflash ⋮ Generic Attacks and the Security of Quartz ⋮ High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems ⋮ On Building Hash Functions from Multivariate Quadratic Equations ⋮ Level-by-level artificial viscosity and visualization for MHD simulation with adaptive mesh refinement ⋮ All in the XL Family: Theory and Practice ⋮ Key Recovery on Hidden Monomial Multivariate Schemes ⋮ Square, a New Multivariate Encryption Scheme ⋮ Topics in Cryptology – CT-RSA 2006 ⋮ Coding and Cryptography ⋮ Cryptanalysis of the new TTS scheme in CHES 2004 ⋮ Public Key Cryptography – PKC 2004 ⋮ Public Key Cryptography – PKC 2004
This page was built for software: FLASH