FLASH
From MaRDI portal
FLASH Q14777
Cited in
(68)- A Fast and Secure Implementation of Sflash
- Practical cryptanalysis of \(k\)-ary \(C^\ast\)
- Computational frameworks for advanced combustion simulations
- Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH
- Kipnis-Shamir attack on unbalanced oil-vinegar scheme
- On Building Hash Functions from Multivariate Quadratic Equations
- Information Security and Cryptology - ICISC 2003
- scientific article; zbMATH DE number 2085432 (Why is no real title available?)
- Topics in Cryptology – CT-RSA 2006
- MI-T-HFE, a new multivariate signature scheme
- Programming matrix algorithms-by-blocks for thread-level parallelism
- Level-by-level artificial viscosity and visualization for MHD simulation with adaptive mesh refinement
- scientific article; zbMATH DE number 2044538 (Why is no real title available?)
- A novel high-order, entropy stable, 3D AMR MHD solver with guaranteed positive pressure
- Development and validation of a chemical reaction solver coupled to the FLASH code for combustion applications
- Parallel Navier-Stokes simulations for high speed compressible flow past arbitrary geometries using FLASH
- Public Key Cryptography - PKC 2005
- Numerical methods of solving equations of hydrodynamics from perspectives of the code FLASH
- Revisiting the cubic UOV signature scheme
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Coding and Cryptography
- Public Key Cryptography - PKC 2005
- A numerical method for shock driven multiphase flow with evaporating particles
- scientific article; zbMATH DE number 1617932 (Why is no real title available?)
- FGb
- CWENO
- CACTUS
- Athena
- MAP
- FLASH
- XCAT-C++
- GASpAR
- QUAD
- SuperMatrix
- CERANS-MHD
- AmrLib
- Bocca
- DRFM
- Cryptographic Hardware and Embedded Systems - CHES 2004
- yt
- EFLASH
- MutantXL
- ZHFE
- On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)
- Generic Attacks and the Security of Quartz
- Ideal GLM-MHD: about the entropy consistent nine-wave magnetic field divergence diminishing ideal magnetohydrodynamics equations
- Efficient public-key operation in multivariate schemes
- Cryptanalysis of SFLASH with Slightly Modified Parameters
- The shortest signatures ever
- Key Recovery on Hidden Monomial Multivariate Schemes
- Square, a New Multivariate Encryption Scheme
- Silver
- Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
- Selecting parameters for the Rainbow signature scheme
- A solution accurate, efficient and stable unsplit staggered mesh scheme for three dimensional magnetohydrodynamics
- Cross-code comparisons of mixing during the implosion of dense cylindrical and spherical shells
- On methods of shortening ElGamal-type signatures
- A new perturbation algorithm and enhancing security of SFLASH signature scheme
- A family of weak keys in HFE and the corresponding practical key-recovery
- Information and Communications Security
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
- Poly-dragon: an efficient multivariate public key cryptosystem
- Public Key Cryptography – PKC 2004
- Cryptanalysis of the new TTS scheme in CHES 2004
- All in the XL Family: Theory and Practice
- Information Security and Privacy
- A uniquely defined entropy stable matrix dissipation operator for high Mach number ideal MHD and compressible Euler simulations
- Public Key Cryptography – PKC 2004
This page was built for software: FLASH