Science-advisor
REGISTER info/FAQ
Login
username
password
     
forgot password?
register here
 
Research articles
  search articles
  reviews guidelines
  reviews
  articles index
My Pages
my alerts
  my messages
  my reviews
  my favorites
 
 
Stat
Members: 2980
Articles: 2'029'581
Articles rated: 2577

18 January 2021
 
  » search

 Search for articles, messages and online reviews


Search in 2'029'581 articles.


Results 1 to 20 of 30 for query "Cryptography and Security math". (0.12 sec.)

[    1    2    ]   Next
1.
On ASGS framework: general requirements and an example of implementation
Kamil Kulesza; Zbigniew Kotulski;
18 Nov 2002
- - -
2.
Combinatorial group theory and public key cryptography
Vladimir Shpilrain; Gabriel Zapata;
5 Oct 2004
- - -
3.
Thompson's group and public key cryptography
Vladimir Shpilrain; Alexander Ushakov;
24 May 2005
- - -
4.
Constructions in public-key cryptography over matrix groups
Dimitri Grigoriev; Ilia Ponomarenko;
10 Jun 2005
- - -
5.
Using decision problems in public key cryptography
Vladimir Shpilrain; Gabriel Zapata;
22 Mar 2007
- - -
6.
Assessing security of some group based cryptosystems
Vladimir Shpilrain;
4 Nov 2003
- - -
7.
Length-based conjugacy search in the Braid group
D. Garber; S. Kaplan; M. Teicher; B. Tsaban; U. Vishne;
20 Sep 2002
- - -
8.
Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis
A. Caranti; F. Dalla Volta; M. Sala; F. Villani;
1 Jun 2006
- - -
9.
Diffie-Hellman Key Exchange Protocol and non-abelian nilpotent groups
Ayan Mahalanobis; PostScript; PDF; Other formats;
13 Feb 2006
- - -
10.
A new key exchange protocol based on the decomposition problem
Vladimir Shpilrain; Alexander Ushakov;
6 Dec 2005
- - -
11.
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
David Jao; Stephen D. Miller; Ramarathnam Venkatesan;
17 Nov 2004
- - -
12.
Probabilistic Solutions of Equations in the Braid Group
D. Garber; S. Kaplan; M. Teicher; B. Tsaban; U. Vishne;
5 Apr 2004
- - -
13.
On alternative approach for verifiable secret sharing
Kamil Kulesza; Zbigniew Kotulski; Joseph Pieprzyk;
18 Nov 2002
- - -
14.
Uniformly distributed sequences of p-adic integers, II
Vladimir Anashin;
30 Sep 2002   /  Diskret.Mat., vol. 14 (2002), no. 4. pp. 3--64 (Russian); Discrete Math. Appl., vol. 12 (2002), no. 6, pp. 527--590 (English translation)
- - -
15.
Decoding by Linear Programming
Emmanuel Candes; Terence Tao;
15 Feb 2005
- - -
16.
Randomness
Paul M.B. Vitanyi;
8 Oct 2001
- - -
17.
On graph coloring check-digit method
Kamil Kulesza; Zbigniew Kotulski;
Rating  5/5
20 Nov 2002
- - -
18.
Continued fractions and RSA with small secret exponent
Andrej Dujella;
20 Feb 2004   /  Tatra Mt. Math. Publ. 29 (2004), 101-112.
- - -
19.
Security of the Cao-Li Public Key Cryptosystem
Lek-Heng Lim;
11 Mar 2000   /  Electronics Letters, Volume 34 Number 2, pp. 170-172, January 22 1998
- - -
20.
Guaranteeing the diversity of number generators
Adi Shamir; Boaz Tsaban;
12 Dec 2001   /  Information and Computation 171 (2001), 350--363
- - -

[ 1 2 ]   Next





ScienXe.org
» my Online CV
» Free


News, job offers and information for researchers and scientists:
home  |  contact  |  terms of use  |  sitemap
Copyright © 2005-2021 - Scimetrica