Massachusetts Institute of Technology A. I. Laboratory Artificial Intelligence Memo No. 239 February 29, 1972 contents index M. Beeler [beeler@bbn.com] R. W. Gosper [rwg@newton.macsyma.com] R. Schroeppel [rcs@cs.arizona.edu] [Retyped and formatted in 'html' ('Web browser format) by Henry Baker, April, 1995. The goal of this 'html' document is to make HAKMEM available to the widest possible audienc
Introduction Mathematics has long played an important role in timekeeping as cultures created calendars to express their unique values. In this article, we will look at an interesting mathematical construction, the Stern-Brocot tree, that was created, in part, to help build timepieces. As we'll see, the tree gives an exceptionally elegant way to enumerate the positive rational numbers and is a sur
Topics Advanced topics class on cryptanalysis of symmetric and public-key primitives and protocols. We will cover recent collision-finding attacks on hash functions, differential and linear cryptanalysis of block ciphers, number-theoretic and lattice-based methods of attacking public-key cryptosystems. CS255 is a prerequisite, although most of the lectures will be self-contained. Here is a tentati
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く