- Sort Score
- Num 10 results
- Language All
Results 1 - 4 of 4 for formats (0.09 seconds)
-
RELEASE.md
`tf.keras`:
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Tue Oct 28 22:27:41 GMT 2025 - 740.4K bytes - Click Count (3) -
docs/en/docs/release-notes.md
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 27 19:06:15 GMT 2025 - 586.7K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
1 { return errors.New("crypto/rsa: invalid CRT coefficient") } // Check that |p - q| > 2^(nlen/2 - 100). // // If p and q are very close to each other, then N=pq can be trivially // factored using Fermat's factorization method. Broken RSA implementations // do generate such keys. See Hanno Böck, Fermat Factorization in the Wild, // https://eprint.iacr.org/2023/026.pdf. diff := bigmod.NewNat() if qP, err := bigmod.NewNat().SetBytes(q.Nat().Bytes(q), p); err != nil { // q > p pQ, err := bigmod.New...Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.1.0-rc1.zip
( "crypto/internal/fips140/drbg" "errors" "math/bits" ) // FIPS 204 defines a needless semi-expanded format for private keys. This is // not a good format for key storage and exchange, because it is large and // requires careful parsing to reject malformed keys. Seeds instead are just 32 // bytes, are always valid, and always expand to valid keys in memory. It is // *also* a poor in-memory format, because it defers computing the NTT of s1, // s2, and t0 and the expansion of A until signing time,...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0)