42 research outputs found
Exponent, November 1957
Published usually four times per year in the interest of the students of the University of Dayton. Contents include short stories, articles, essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1446/thumbnail.jp
University of Dayton Exponent, April 1954
Published monthly, usually October through May, in the interest of the students of the University of Dayton. Contents include essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1432/thumbnail.jp
The University of Dayton Exponent, November 1949
Published monthly, usually October through May, in the interest of the students of the University of Dayton. Contents include essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1302/thumbnail.jp
Exponent, March 1965
Published usually four times per year in the interest of the students of the University of Dayton. Contents include short stories, articles, essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1475/thumbnail.jp
Hydrogeologic Investigation of Karst near Askov Lagoons, Askov, Minnesota
Detailed report including extensive study area introduction (geologic, hydrogeologic, and geographic), detailed methods, results and discussion, and numerous figures and tables. A collaborative effort between Exponent (R), the University of Minnesota, the Pollution Control Agency, and Pine County
Cryptanalysis of Unbalanced RSA
Abstract. We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In our scenario, the factor q is smaller than Nfi and the decryption exponent d is small modulo p- 1. We introduce two approaches that both use a modular bivariate polynomial equation with a small root. Extracting this root is in both methods equivalent to the factorization of the modulus N = pq. Applying a method of Coppersmith, one can construct from a bivariate modular equation a bivariate polynomial f(x, y) over Z that has the same small root. In our first method, we prove that one can extract the desired root of f(x, y) in polynomial time. This method works up to fi < 3-p52 ss 0.382. Our second method uses a heuristic to find the root. This method improves upon the first one by allowing larger values of d modulo p- 1. Keywords: RSA, lattice reduction, Coppersmith's method, small secret exponent 1 Introduction An RSA key is a tuple (N, e) where N = pq is the product of two primes and e is the public key. The corresponding secret key d satisfies the equation ed = 1 mod (p-1)(q-1)2 with gcd(p- 1, q-12) = 1. The Chinese Remainder Theorem (CRT) gives us the equations ed = 1 mod p- 1 and ed = 1 mod q-12.To speed up the RSA decryption and signature generation process, one i
Jews in the Realm of Music : many notable contributions
Newspaper article with references to music
Article re: PanAm flight to South America
Headline: "Publishers Making Aerial Goodfellow Visit in Great Plane to South America
