Search

Showing total 47 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english Journal applicable algebra in engineering, communication & computing Remove constraint Journal: applicable algebra in engineering, communication & computing
47 results

Search Results

1. Two modifications for Loidreau's code-based cryptosystem.

2. Special Issue: "Computer Algebra and Application to Combinatorics, Coding Theory and Cryptography" ACA 2019, Montreal, Canada, July 16–20, 2019.

3. Affine equivalence and non-linearity of permutations over $$\mathbb Z_n$$.

4. On the algebraic structure of Ep(m) and applications to cryptography.

5. Efficient hash maps to G2 on BLS curves.

6. Mirror theory and cryptography.

7. The l-th power Diffie-Hellman problem and the l-th root Diffie-Hellman problem.

9. Error-correcting codes and cryptography.

10. Fixed points of rational functions satisfying the Carlitz property.

11. Further refinements of Miller's algorithm on Edwards curves.

12. Multibase scalar multiplications in cryptographic pairings.

13. Orthogonal matrix and its application in Bloom's threshold scheme.

14. Some classes of permutation polynomials over finite fields with odd characteristic.

15. Sampling from discrete Gaussians for lattice-based cryptography on a constrained device.

16. On the optimality of lattices for the coppersmith technique.

17. Choosing and generating parameters for pairing implementation on BN curves.

18. Cryptanalysis of a key exchange protocol based on the ring Ep(m).

19. New cyclic groups based on the generalized order-<italic>k</italic> Pell sequences in the Heisenberg group and their application in cryptography.

20. Linear codes from quadratic forms.

21. Several proofs of security for a tokenization algorithm.

22. On the security of the modified Dual-ouroboros PKE using Gabidulin codes.

23. Boolean functions with two distinct Walsh coefficients.

24. The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity.

25. Predicting the elliptic curve congruential generator.

26. Several classes of Boolean functions with few Walsh transform values.

27. A multivariate based threshold ring signature scheme.

28. E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation.

30. Several classes of binary linear codes and their weight enumerators.

31. Affine braid groups: a better platform than braid groups for cryptology?

32. Collisions in Fast Generation of Ideal Classes and Points on Hyperelliptic and Elliptic Curves.

33. Cryptanalysis of Rédei- and Dickson permutations on arbitrary finite rings.

34. On the index of the Diffie–Hellman mapping.

35. Some results on the differential functions over finite fields.

36. Cryptanalysis of a key exchange protocol based on the endomorphisms ring End $$((\mathbb(Z)_(p) \times \mathbb(Z)_(p2)))$$.

37. Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures.

38. On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion.

39. Trace representation of pseudorandom binary sequences derived from Euler quotients.

40. An extension of the (strong) primitive normal basis theorem.

41. Polynomial generating pairing and its criterion for optimal pairing.

42. An algorithm for computing the error sequence of $$p^{n}$$ -periodic binary sequences.

43. On the provable security of BEAR and LION schemes.

44. Extensions of access structures and their cryptographic applications.

45. On perfect nonlinear functions (Π).

46. In search of mathematical primitives for deriving universal projective hash families.

47. Analysis of ( k ,k) clock-controlled sequences.