Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 682387 - MaRDI portal

scientific article; zbMATH DE number 682387

From MaRDI portal
Publication:4312125

zbMath0819.11001MaRDI QIDQ4312125

Neal Koblitz

Publication date: 6 November 1994


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (65)

Affine equivalence and non-linearity of permutations over \(\mathbb Z_n\)An efficient ECDSA-based signature scheme for wireless networksA new undeniable signature scheme on general linear group over group ringGroup ring based public key cryptosystemsPrimes in quadratic unique factorization domainsUnnamed ItemA type of public cryptosystem using polynomials and pell sequencesHardware implementation of finite-field divisionFactoring RSA moduli with primes sharing bits in the middleAlmost all hyperharmonic numbers are not integersOn small world semiplanes with generalised Schubert cellsSafer parameters for the Chor-Rivest cryptosystemA Public Key Cryptosystem Using Hiil's CipherA mathematical framework for the semantics of symbolic languages representing periodic timeSOME ARITHMETICAL PROPERTIES ON HYPERBOLAComputational Number Theory and CryptographyMatrix-Product Constructions for Hermitian Self-Orthogonal CodesCramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoringPseudorandom bit sequence generator for stream cipher based on elliptic curvesRelative generalized Hamming weights of \(q\)-ary Reed-Muller codesUnnamed ItemGENERALIZED RSA CIPHER AND DIFFIE-HELLMAN PROTOCOLCryptanalysis of a combinatorial public key cryptosystemFast algorithms for solving equations of degree \(\le 4\) in some finite fieldsPeriodic Orbits of Planar Integrable Birational MapsProof the Skewes' number is not an integer using lattice points and tangent lineA survey of some applications of finite fieldsOn families of graphs of large cycle indicator, matrices of large order and key exchange protocols with nonlinear polynomial maps of small degreeLateral Movement in Undergraduate Research: Case Studies in Number TheoryPerformance of algebraic graphs based stream-ciphers using large finite fieldsGeneration of pseudorandom sequence over elliptic curve group and their propertiesHOW A NONASSOCIATIVE ALGEBRA REFLECTS THE PROPERTIES OF A SKEW POLYNOMIALFactorization with a logarithmic energy spectrumEvaluation codes and their basic parametersEncode-then-Encrypt: A Novel Framework for Reliable and Secure CommunicationPrivate key agreement and secure communication for heterogeneous sensor networksHankel determinant solution for elliptic sequenceThe Diffie-Hellman key exchange protocol and non-Abelian nilpotent groupsA SEMANTICALLY SECURE PUBLIC-KEY CRYPTOSYSTEM BASED ON RSARemarks on 0-1 Optimization Problems with Superincreasing and Superdecreasing Objective FunctionsUndeniable signature scheme based over group ringA method for distorting the frequency of character occurrence in the simple substitution cipherCoset intersection of irreducible plane cubicsA quick exponentiation algorithm for \(3\times 3\) block upper triangular matricesRational points on elliptic curves \(y^2=x^3+a^3\) in \(\mathbb F_p\) where \(p\equiv 1\pmod 6\) is primeOn finding Fermat’s pairsA traceable proxy multisignature scheme based on the elliptic curve cryptosystemSpeeding up exponentiation using an untrusted computational resourceOn the representation of the number of integral points of an elliptic curve modulo a prime numberFactoring and Testing Primes in Small SpaceAn efficient undeniable group-oriented signature schemeA key exchange protocol using matrices over group ringImproved cryptanalysis of a ElGamal cryptosystem based on matrices over group ringsA Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve CryptographySufficient conditions for factoring a class of large integersThe operation of the elliptic curve cryptology in IPv6Fast group operations on elliptic curves in MapleUnary coded PSPACE-complete languages in \(\mathrm{ASPACE}(\log\log n)\)Interpolation of the discrete logarithm in \(\mathbb{F}_{q}\) by Boolean functions and by polynomials in several variables modulo a divisor of \(q-1\).Some application of difference equations in Cryptography and Coding TheoryUnnamed ItemApplication of commutative rings with unity for construction of symmetric encryption systemNumber-theoretical methods of factoring composite numbers and calculating the discrete logarithmSymmetric information exchange system based on ring isomorphismComputation of Fermat’s pseudoprimes (Dedicated to the Memory of Professor Leetsch C. Hsu)




This page was built for publication: