42 research outputs found

    Exponent, November 1957

    Get PDF
    Published usually four times per year in the interest of the students of the University of Dayton. Contents include short stories, articles, essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1446/thumbnail.jp

    University of Dayton Exponent, April 1954

    Get PDF
    Published monthly, usually October through May, in the interest of the students of the University of Dayton. Contents include essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1432/thumbnail.jp

    The University of Dayton Exponent, November 1949

    Get PDF
    Published monthly, usually October through May, in the interest of the students of the University of Dayton. Contents include essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1302/thumbnail.jp

    Exponent, March 1965

    Get PDF
    Published usually four times per year in the interest of the students of the University of Dayton. Contents include short stories, articles, essays, editorials, poems, plays, histories, and other creative works.https://ecommons.udayton.edu/exponent/1475/thumbnail.jp

    Hydrogeologic Investigation of Karst near Askov Lagoons, Askov, Minnesota

    Get PDF
    Detailed report including extensive study area introduction (geologic, hydrogeologic, and geographic), detailed methods, results and discussion, and numerous figures and tables. A collaborative effort between Exponent (R), the University of Minnesota, the Pollution Control Agency, and Pine County

    Cryptanalysis of Unbalanced RSA

    No full text
    Abstract. We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In our scenario, the factor q is smaller than Nfi and the decryption exponent d is small modulo p- 1. We introduce two approaches that both use a modular bivariate polynomial equation with a small root. Extracting this root is in both methods equivalent to the factorization of the modulus N = pq. Applying a method of Coppersmith, one can construct from a bivariate modular equation a bivariate polynomial f(x, y) over Z that has the same small root. In our first method, we prove that one can extract the desired root of f(x, y) in polynomial time. This method works up to fi < 3-p52 ss 0.382. Our second method uses a heuristic to find the root. This method improves upon the first one by allowing larger values of d modulo p- 1. Keywords: RSA, lattice reduction, Coppersmith's method, small secret exponent 1 Introduction An RSA key is a tuple (N, e) where N = pq is the product of two primes and e is the public key. The corresponding secret key d satisfies the equation ed = 1 mod (p-1)(q-1)2 with gcd(p- 1, q-12) = 1. The Chinese Remainder Theorem (CRT) gives us the equations ed = 1 mod p- 1 and ed = 1 mod q-12.To speed up the RSA decryption and signature generation process, one i

    Jews in the Realm of Music : many notable contributions

    No full text
    Newspaper article with references to music

    Article re: PanAm flight to South America

    No full text
    Headline: "Publishers Making Aerial Goodfellow Visit in Great Plane to South America
    corecore