American Mathematical Society

My Account · My Cart · Customer Services · FAQ  
AMS eContent Search Results
Matches for: msc=(68P25) AND publication=(all)
Sort order: Date
Format: Standard display

  
Results: 1 to 30 of 62 found      Go to page: 1 2 3

[1] Maggie E. Habeeb. A verifiable secret sharing scheme using non-abelian groups. Contemporary Mathematics 677 (2016) 79-83.
Book volume table of contents   
View Article: PDF

[2] Rainer Göttfert. A generalization of the nonlinear combination generator. Contemporary Mathematics 632 (2015) 121-137.
Book volume table of contents   
View Article: PDF

[3] Maggie Habeeb, Delaram Kahrobaei and Vladimir Shpilrain. A Secret Sharing Scheme Based on Group Presentations and the Word Problem. Contemporary Mathematics 582 (2012) 143-150.
Book volume table of contents   
View Article: PDF

[4] Alexei Myasnikov, Vladimir Shpilrain and Alexander Ushakov. Non-commutative Cryptography and Complexity of Group-theoretic Problems. Math. Surveys Monogr. 177 (2011) MR 2850384.
Book volume table of contents   

[5] D. Grigoriev, A. Kojevnikov and S. J. Nikolenko. Algebraic cryptography: New constructions and their security against provable break. St. Petersburg Math. J. 20 (2009) 937-953.
Abstract, references, and article information   
View Article: PDF
This article is available free of charge

[6] David L. Donoho and Jared Tanner. Counting faces of randomly projected polytopes when the projection radically lowers dimension. J. Amer. Math. Soc. 22 (2009) 1-53. MR 2449053.
Abstract, references, and article information   
View Article: PDF
This article is available free of charge

[7] Finding inverses modulo $n$. Mathematical World 25 (2006) 81-87.
Book volume table of contents
View Article: PDF

[8] Cryptanalysis for the multiplication-shift cipher. Mathematical World 25 (2006) 59-67.
Book volume table of contents
View Article: PDF

[9] Preparing to generalize. Mathematical World 25 (2006) 75-79.
Book volume table of contents
View Article: PDF

[10] Multiplication cipher. Mathematical World 25 (2006) 37-45.
Book volume table of contents
View Article: PDF

[11] Non-mathematical substitution ciphers. Mathematical World 25 (2006) 69-74.
Book volume table of contents
View Article: PDF

[12] Terminology and results from number theory. Mathematical World 25 (2006) 9-15.
Book volume table of contents
View Article: PDF

[13] Introduction. Mathematical World 25 (2006) 1-2.
Book volume table of contents
View Article: PDF

[14] Cryptanalysis for the exponential cipher. Mathematical World 25 (2006) 119-122.
Book volume table of contents
View Article: PDF

[15] Caesar cipher. Mathematical World 25 (2006) 3-8.
Book volume table of contents
View Article: PDF

[16] Security and implementation of the RSA cipher. Mathematical World 25 (2006) 143-148.
Book volume table of contents
View Article: PDF

[17] Answers to selected exercises. Mathematical World 25 (2006) 153-155.
Book volume table of contents
View Article: PDF

[18] RSA cipher. Mathematical World 25 (2006) 131-132.
Book volume table of contents
View Article: PDF

[19] Security of the general multiplication-shift cipher. Mathematical World 25 (2006) 93-101.
Book volume table of contents
View Article: PDF

[20] General multiplication-shift cipher. Mathematical World 25 (2006) 89-91.
Book volume table of contents
View Article: PDF

[21] Anne L. Young. Mathematical Ciphers. Mathematical World 25 (2006) MR MR2249094.
Book volume table of contents

[22] Signatures. Mathematical World 25 (2006) 133-142.
Book volume table of contents
View Article: PDF

[23] Deciphering the exponential cipher. Mathematical World 25 (2006) 111-118.
Book volume table of contents
View Article: PDF

[24] Computer programs. Mathematical World 25 (2006) 149-150.
Book volume table of contents
View Article: PDF

[25] Further reading. Mathematical World 25 (2006) 151-152.
Book volume table of contents
View Article: PDF

[26] Index. Mathematical World 25 (2006) 157-159.
Book volume table of contents
View Article: PDF

[27] Describing the Caesar cipher mathematically. Mathematical World 25 (2006) 27-30.
Book volume table of contents
View Article: PDF

[28] Multiplication-shift cipher. Mathematical World 25 (2006) 51-57.
Book volume table of contents
View Article: PDF

[29] Introduction to the exponential cipher. Mathematical World 25 (2006) 103-109.
Book volume table of contents
View Article: PDF

[30] Public key ciphers. Mathematical World 25 (2006) 127-130.
Book volume table of contents
View Article: PDF


Results: 1 to 30 of 62 found      Go to page: 1 2 3


Comments: Email Webmaster

© Copyright , American Mathematical Society
Contact Us · Sitemap · Privacy Statement

Connect with us Facebook Twitter Google+ LinkedIn Instagram RSS feeds Blogs YouTube Podcasts Wikipedia