American Mathematical Society

My Account · My Cart · Customer Services · FAQ  
AMS eContent Search Results
Matches for: msc=(68P25) AND publication=(all)
Sort order: Date
Format: Standard display

  
Results: 1 to 30 of 42 found      Go to page: 1 2

[1] Rainer Göttfert. A generalization of the nonlinear combination generator. Contemporary Mathematics 632 (2015) 121-137.
Book volume table of contents   
View Article: PDF

[2] Maggie Habeeb, Delaram Kahrobaei and Vladimir Shpilrain. A Secret Sharing Scheme Based on Group Presentations and the Word Problem. Contemporary Mathematics 582 (2012) 143-150.
Book volume table of contents   
View Article: PDF

[3] Alexei Myasnikov, Vladimir Shpilrain and Alexander Ushakov. Non-commutative Cryptography and Complexity of Group-theoretic Problems. Math. Surveys Monogr. 177 (2011) MR 2850384.
Book volume table of contents   

[4] D. Grigoriev, A. Kojevnikov and S. J. Nikolenko. Algebraic cryptography: New constructions and their security against provable break. St. Petersburg Math. J. 20 (2009) 937-953.
Abstract, references, and article information   
View Article: PDF
This article is available free of charge

[5] David L. Donoho and Jared Tanner. Counting faces of randomly projected polytopes when the projection radically lowers dimension. J. Amer. Math. Soc. 22 (2009) 1-53. MR 2449053.
Abstract, references, and article information   
View Article: PDF
This article is available free of charge

[6] Finding inverses modulo $n$. Mathematical World 25 (2006) 81-87.
Book volume table of contents
View Article: PDF

[7] Cryptanalysis for the multiplication-shift cipher. Mathematical World 25 (2006) 59-67.
Book volume table of contents
View Article: PDF

[8] Preparing to generalize. Mathematical World 25 (2006) 75-79.
Book volume table of contents
View Article: PDF

[9] Multiplication cipher. Mathematical World 25 (2006) 37-45.
Book volume table of contents
View Article: PDF

[10] Non-mathematical substitution ciphers. Mathematical World 25 (2006) 69-74.
Book volume table of contents
View Article: PDF

[11] Terminology and results from number theory. Mathematical World 25 (2006) 9-15.
Book volume table of contents
View Article: PDF

[12] Introduction. Mathematical World 25 (2006) 1-2.
Book volume table of contents
View Article: PDF

[13] Cryptanalysis for the exponential cipher. Mathematical World 25 (2006) 119-122.
Book volume table of contents
View Article: PDF

[14] Caesar cipher. Mathematical World 25 (2006) 3-8.
Book volume table of contents
View Article: PDF

[15] Security and implementation of the RSA cipher. Mathematical World 25 (2006) 143-148.
Book volume table of contents
View Article: PDF

[16] Answers to selected exercises. Mathematical World 25 (2006) 153-155.
Book volume table of contents
View Article: PDF

[17] RSA cipher. Mathematical World 25 (2006) 131-132.
Book volume table of contents
View Article: PDF

[18] Security of the general multiplication-shift cipher. Mathematical World 25 (2006) 93-101.
Book volume table of contents
View Article: PDF

[19] General multiplication-shift cipher. Mathematical World 25 (2006) 89-91.
Book volume table of contents
View Article: PDF

[20] Anne L. Young. Mathematical Ciphers. Mathematical World 25 (2006) MR MR2249094.
Book volume table of contents

[21] Signatures. Mathematical World 25 (2006) 133-142.
Book volume table of contents
View Article: PDF

[22] Deciphering the exponential cipher. Mathematical World 25 (2006) 111-118.
Book volume table of contents
View Article: PDF

[23] Computer programs. Mathematical World 25 (2006) 149-150.
Book volume table of contents
View Article: PDF

[24] Further reading. Mathematical World 25 (2006) 151-152.
Book volume table of contents
View Article: PDF

[25] Index. Mathematical World 25 (2006) 157-159.
Book volume table of contents
View Article: PDF

[26] Describing the Caesar cipher mathematically. Mathematical World 25 (2006) 27-30.
Book volume table of contents
View Article: PDF

[27] Multiplication-shift cipher. Mathematical World 25 (2006) 51-57.
Book volume table of contents
View Article: PDF

[28] Introduction to the exponential cipher. Mathematical World 25 (2006) 103-109.
Book volume table of contents
View Article: PDF

[29] Public key ciphers. Mathematical World 25 (2006) 127-130.
Book volume table of contents
View Article: PDF

[30] Mathematical basis for the exponential cipher. Mathematical World 25 (2006) 123-126.
Book volume table of contents
View Article: PDF


Results: 1 to 30 of 42 found      Go to page: 1 2


Comments: Email Webmaster

© Copyright , American Mathematical Society
Contact Us · Sitemap · Privacy Statement

Connect with us Facebook Twitter Google+ LinkedIn Instagram RSS feeds Blogs YouTube Podcasts Wikipedia