Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
FLASH - MaRDI portal

FLASH

From MaRDI portal
Software:14777



swMATH2233MaRDI QIDQ14777


No author found.





Related Items (49)

Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption SchemePractical Cryptanalysis of k-ary $$C^*$$A new perturbation algorithm and enhancing security of SFLASH signature schemeA novel high-order, entropy stable, 3D AMR MHD solver with guaranteed positive pressureThe Shortest Signatures EverMI-T-HFE, A New Multivariate Signature SchemeDevelopment and validation of a chemical reaction solver coupled to the FLASH code for combustion applicationsParallel Navier-Stokes simulations for high speed compressible flow past arbitrary geometries using FLASHOn tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)Unnamed ItemCryptographic Hardware and Embedded Systems - CHES 2004On methods of shortening ElGamal-type signaturesIdeal GLM-MHD: about the entropy consistent nine-wave magnetic field divergence diminishing ideal magnetohydrodynamics equationsA solution accurate, efficient and stable unsplit staggered mesh scheme for three dimensional magnetohydrodynamicsCross-code comparisons of mixing during the implosion of dense cylindrical and spherical shellsUnnamed ItemEfficient public-key operation in multivariate schemesUnnamed ItemA family of weak keys in HFE and the corresponding practical key-recoveryProjective interpolation of polynomial vectors and improved key recovery attack on SFLASHA numerical method for shock driven multiphase flow with evaporating particlesComputational Frameworks for Advanced Combustion SimulationsRevisiting the Cubic UOV Signature SchemeProgramming matrix algorithms-by-blocks for thread-level parallelismInformation and Communications SecurityPoly-Dragon: an efficient multivariate public key cryptosystemInformation Security and PrivacyKipnis-Shamir Attack on Unbalanced Oil-Vinegar SchemePublic Key Cryptography - PKC 2005Public Key Cryptography - PKC 2005Information Security and Cryptology - ICISC 2003A uniquely defined entropy stable matrix dissipation operator for high Mach number ideal MHD and compressible Euler simulationsSelecting Parameters for the Rainbow Signature SchemeNumerical methods of solving equations of hydrodynamics from perspectives of the code FLASHCryptanalysis of SFLASH with Slightly Modified ParametersRainbow, a New Multivariable Polynomial Signature SchemeA Fast and Secure Implementation of SflashGeneric Attacks and the Security of QuartzHigh Order Linearization Equation (HOLE) Attack on Multivariate Public Key CryptosystemsOn Building Hash Functions from Multivariate Quadratic EquationsLevel-by-level artificial viscosity and visualization for MHD simulation with adaptive mesh refinementAll in the XL Family: Theory and PracticeKey Recovery on Hidden Monomial Multivariate SchemesSquare, a New Multivariate Encryption SchemeTopics in Cryptology – CT-RSA 2006Coding and CryptographyCryptanalysis of the new TTS scheme in CHES 2004Public Key Cryptography – PKC 2004Public Key Cryptography – PKC 2004


This page was built for software: FLASH