In Memory of Jack Levine (1907–2005)
From MaRDI portal
Publication:3452644
DOI10.1080/01611190600557050zbMath1325.94003OpenAlexW2081001758MaRDI QIDQ3452644
Publication date: 13 November 2015
Published in: Cryptologia (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/01611190600557050
Biographies, obituaries, personalia, bibliographies (01A70) History of information and communication theory (94-03)
Related Items (1)
Cites Work
- On the application of MacMahon diagrams to certain problems in the multiplication of monomial symmetric functions
- Coefficient identities derived from expansions of elementary symmetric function products in terms of power sums
- Automorphisms of Abelian groups induced by involutory matrices
- Scalar polynomial functions on the \(n\times n\) matrices over a finite field
- In memoriam Leonard Carlitz (1907-1999)
- Power sums of matrices over a finite field
- Dedicated to Leonard Carlitz: The man and his work
- Automorphisms of Abelian groups induced by involutory matrices, general modulus
- Equivalence classes of linear mappings with applications to algebraic cryptography. I
- Equivalence classes of linear mappings with applications to algebraic cryptography. II
- Equivalence classes of involutory mappings
- Automorphisms of abelian groups induced by involutory matrices, modulo \(p>2\)
- THE TWO-MESSAGE PROBLEM IN CIPHER TEXT AUTOKEY. PART I.
- THE TWO-MESSAGE PROBLEM IN CIPHER TEXT AUTOKEY. PART II
- A Binomial Identity Related to Rhyming Sequences
- Note on an Identity of Cayley
- MONOMIAL-MONOMIAL SYMMETRIC FUNCTION TABLES
- Variable Matrix Substitution in Algebraic Crytography
- An Identity of Cayley
- Some Elementary Cryptanalysis of Algebraic Cryptography
- On the Construction of Involutory Matrices
- APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART I.
- APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART II.
- APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART III.
- APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART IV.
- THE TWO-MESSAGE PROBLEM IN THE HILL CRYPTOGRAPHIC SYSTEM WITH UNKNOWN CIPHER ALPHABET
- Concerning Certain Linear Transformation Apparatus of Cryptography
This page was built for publication: In Memory of Jack Levine (1907–2005)