Skip to search formSkip to main contentSkip to account menu

Brent's method

Known as: Brents method, Van Wijngaarden-Dekker-Brent method, Brent method 
In numerical analysis, Brent's method is a root-finding algorithm combining the bisection method, the secant method and inverse quadratic… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs have played a significant role in the… 
Highly Cited
2012
Highly Cited
2012
The design of adders on quantum dot cellular automata (QCA) has been of recent interest. While few designs exist, investigations… 
Highly Cited
2010
Highly Cited
2010
Moving from a neoliberal ideological testing ground to part of the purported new wave of Latin American socialism, the current… 
Highly Cited
2009
Highly Cited
2009
Attribute based encryption (ABE) [13] determines decryption ability based on a user's attributes. In a multi-authority ABE scheme… 
Highly Cited
2009
Highly Cited
2009
SummaryConvergence-confinement analysis for tunneling is a standard approach for preliminary analysis of anticipated wall… 
Highly Cited
2009
Highly Cited
2009
  • J. Cheon
  • Journal of Cryptology
  • 2009
  • Corpus ID: 9788770
AbstractLet g be an element of prime order p in an abelian group, and let α∈ℤp. We show that if g,gα, and $g^{\alpha^{d}}$ are… 
Highly Cited
2007
Highly Cited
2007
This paper describes the first identity-based broadcast encryption scheme (IBBE) with constant size ciphertexts and private keys… 
2006
2006
Actual predation is rarely observed in the field, and therefore the role of predators is often severely underestimated. Species… 
Highly Cited
1990
Highly Cited
1990
A parallel computing system becomes increasingly prone to failure as the number of processing elements in it increases. In this…