FLASH
From MaRDI portal
Software:14777
swMATH2233MaRDI QIDQ14777FDOQ14777
Author name not available (Why is that?)
Cited In (49)
- Selecting Parameters for the Rainbow Signature Scheme
- Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH
- Poly-Dragon: an efficient multivariate public key cryptosystem
- On Building Hash Functions from Multivariate Quadratic Equations
- Information Security and Cryptology - ICISC 2003
- Topics in Cryptology – CT-RSA 2006
- Title not available (Why is that?)
- Programming matrix algorithms-by-blocks for thread-level parallelism
- Level-by-level artificial viscosity and visualization for MHD simulation with adaptive mesh refinement
- Title not available (Why is that?)
- A novel high-order, entropy stable, 3D AMR MHD solver with guaranteed positive pressure
- Public Key Cryptography - PKC 2005
- Development and validation of a chemical reaction solver coupled to the FLASH code for combustion applications
- Parallel Navier-Stokes simulations for high speed compressible flow past arbitrary geometries using FLASH
- Numerical methods of solving equations of hydrodynamics from perspectives of the code FLASH
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme
- Coding and Cryptography
- Public Key Cryptography - PKC 2005
- A numerical method for shock driven multiphase flow with evaporating particles
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
- Generic Attacks and the Security of Quartz
- On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)
- Ideal GLM-MHD: about the entropy consistent nine-wave magnetic field divergence diminishing ideal magnetohydrodynamics equations
- Efficient public-key operation in multivariate schemes
- Cryptanalysis of SFLASH with Slightly Modified Parameters
- Computational Frameworks for Advanced Combustion Simulations
- Key Recovery on Hidden Monomial Multivariate Schemes
- Practical Cryptanalysis of k-ary $$C^*$$
- MI-T-HFE, A New Multivariate Signature Scheme
- Square, a New Multivariate Encryption Scheme
- Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
- On methods of shortening ElGamal-type signatures
- Revisiting the Cubic UOV Signature Scheme
- A solution accurate, efficient and stable unsplit staggered mesh scheme for three dimensional magnetohydrodynamics
- Cross-code comparisons of mixing during the implosion of dense cylindrical and spherical shells
- A new perturbation algorithm and enhancing security of SFLASH signature scheme
- Information and Communications Security
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
- A family of weak keys in HFE and the corresponding practical key-recovery
- The Shortest Signatures Ever
- Public Key Cryptography – PKC 2004
- Cryptanalysis of the new TTS scheme in CHES 2004
- All in the XL Family: Theory and Practice
- Information Security and Privacy
- Public Key Cryptography – PKC 2004
- A Fast and Secure Implementation of Sflash
- A uniquely defined entropy stable matrix dissipation operator for high Mach number ideal MHD and compressible Euler simulations
This page was built for software: FLASH