Help


[permalink] [id link]
+
Page "Hypergeometric function" ¶ 23
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

Elliptic and modular
* Elliptic modular function

Elliptic and functions
* Harris Hancock Lectures on the theory of Elliptic functions ( New York, J. Wiley & sons, 1910 )
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Elliptic functions are functions of two variables.
Category: Elliptic functions
Elliptic regularity implies that their solutions tend to be smooth functions ( if the coefficients in the operator are smooth ).
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions
Category: Elliptic functions

Elliptic and can
Later in the 19th century, the German mathematician Bernhard Riemann developed Elliptic geometry, another non-Euclidean geometry where no parallel can be found and the sum of angles in a triangle is more than 180 °.
Elliptic geometry is a non-Euclidean geometry, in which, given a line L and a point p outside L, there exists no line parallel to L passing through p. Elliptic geometry, like hyperbolic geometry, violates Euclid's parallel postulate, which can be interpreted as asserting that there is exactly one line parallel to L passing through p. In elliptic geometry, there are no parallel lines at all.

Elliptic and sometimes
: Elliptic geometry is also sometimes called " Riemannian geometry ".

Elliptic and be
As a result, usually, when a digital IIR filter is going to be implemented, an analog filter ( e. g. Chebyshev filter, Butterworth filter, Elliptic filter ) is first designed and then is converted to a digital filter by applying discretization techniques such as Bilinear transform or Impulse invariance.

Elliptic and whose
: Elliptic orbit-An orbit with an eccentricity greater than 0 and less than 1 whose orbit traces the path of an ellipse.

Elliptic and are
The NSA specifies that " Elliptic Curve Public Key Cryptography using the 256-bit prime modulus elliptic curve as specified in FIPS-186-2 and SHA-256 are appropriate for protecting classified information up to the SECRET level.
Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization.
Elliptic operators are typical of potential theory, and they appear frequently in electrostatics and continuum mechanics.
Elliptic filters are generally specified by requiring a particular value for the passband ripple, stopband ripple and the sharpness of the cutoff.

Elliptic and 1
* Standards for Efficient Cryptography Group ( SECG ), SEC 1: Elliptic Curve Cryptography, Version 1. 0, September 20, 2000.
* κ = 1: Elliptic surfaces
* Viktor Prasolov and Yuri Solovyev ( 1997 ) Elliptic Functions and Elliptic Integrals, page 1, Translations of Mathematical Monographs volume 170, American Mathematical Society.
* SEC 1: Elliptic Curve Cryptography ( Version 1. 0-Superseded by Version 2. 0 )
* SEC 1: Elliptic Curve Cryptography ( Version 2. 0 )
* SEC 2: Recommended Elliptic Curve Domain Parameters ( Version 1. 0-Superseded by Version 2. 0

Elliptic and /
* L. Washington, Elliptic Curves: Number Theory and Cryptography, Chapman & Hall / CRC, 2003.
* Conjectured Security of the ANSI-NIST Elliptic Curve RNG, Daniel R. L. Brown, IACR ePrint 2006 / 117.
* A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator, Daniel R. L. Brown and Kristian Gjosteen, IACR ePrint 2007 / 048.
* Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator, Berry Schoenmakers and Andrey Sidorenko, IACR ePrint 2006 / 190.
* DL / ECKAS-DH1 and DL / ECKAS-DH2 ( Discrete Logarithm / Elliptic Curve Key Agreement Scheme, Diffie-Hellman version ): This includes both traditional Diffie-Hellman and Elliptic Curve Diffie-Hellman.
* DL / ECKAS-MQV ( Discrete Logarithm / Elliptic Curve Key Agreement Scheme, Menezes-Qu-Vanstone version )
* DL / ECSSA ( Discrete Logarithm / Elliptic Curve Signature Scheme with Appendix ): Includes four main variants: DSA, ECDSA, Nyberg-Rueppel, and Elliptic Curve Nyberg-Rueppel.
* DL / ECSSR ( Discrete Logarithm / Elliptic Curve Signature Scheme with Recovery )
* DL / ECSSR-PV ( Discrete Logarithm / Elliptic Curve Signature Scheme with Recovery, Pintsov-Vanstone version )
* DL / ECIES ( Discrete Logarithm / Elliptic Curve Integrated Encryption Scheme ): Essentially the " DHAES " variant of ElGamal encryption.

0.216 seconds.