American Mathematical Society

My Account · My Cart · Customer Services · FAQ  
AMS eContent Search Results
Matches for: msc=(94A60) AND publication=(all)
Sort order: Date
Format: Standard display

  
Results: 1 to 30 of 133 found      Go to page: 1 2 3 4 > >>

[1] Catalina V. Anghel. The self-power map and collecting all residue classes. Math. Comp. 85 (2016) 379-399.
Abstract, references, and article information   
View Article: PDF

[2] Ayan Mahalanobis. The MOR cryptosystem and finite $p$-groups. Contemporary Mathematics 633 (2015) 81-95.
Book volume table of contents   
View Article: PDF

[3] Bren Cavallo and Delaram Kahrobaei. Secret sharing using non-commutative groups and the shortlex order. Contemporary Mathematics 633 (2015) 1-8.
Book volume table of contents   
View Article: PDF

[4] Anja I. S. Moldenhauer. A group theoretical ElGamal cryptosystem based on a semidirect product of groups and a proposal for a signature protocol. Contemporary Mathematics 633 (2015) 97-113.
Book volume table of contents   
View Article: PDF

[5] Sihem Mesnager. Bent functions from spreads. Contemporary Mathematics 632 (2015) 295-316.
Book volume table of contents   
View Article: PDF

[6] Rainer Göttfert. A generalization of the nonlinear combination generator. Contemporary Mathematics 632 (2015) 121-137.
Book volume table of contents   
View Article: PDF

[7] Anne Canteaut and Joëlle Roué. Extended differential properties of cryptographic functions. Contemporary Mathematics 632 (2015) 43-70.
Book volume table of contents   
View Article: PDF

[8] Romain Cosset and Damien Robert. Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus $2$ curves. Math. Comp. 84 (2015) 1953-1975.
Abstract, references, and article information   
View Article: PDF

[9] San Ling, Igor Shparlinski and Huaxiong Wang. On the Multidimensional Distribution of the Naor--Reingold Pseudo-Random Function. Math. Comp. 83 (2014) 2429-2434.
Abstract, references, and article information   
View Article: PDF

[10] Domingo Gómez-Pérez, Alina Ostafe and Igor Shparlinski. Algebraic entropy, automorphisms and sparsity of algebraic dynamical systems and pseudorandom number generators. Math. Comp. 83 (2014) 1535-1550.
Abstract, references, and article information   
View Article: PDF

[11] Modern cryptography. Mathematical World 29 (2013) 269-287.
Book volume table of contents
View Article: PDF

[12] Solutions to selected exercises. Mathematical World 29 (2013) 317-323.
Book volume table of contents
View Article: PDF

[13] Introduction to public-channel cryptography. Mathematical World 29 (2013) 171-211.
Book volume table of contents
View Article: PDF

[14] Primality testing and factorization. Mathematical World 29 (2013) 289-315.
Book volume table of contents
View Article: PDF

[15] Enigma and Ultra. Mathematical World 29 (2013) 51-79.
Book volume table of contents
View Article: PDF

[16] Historical introduction. Mathematical World 29 (2013) 1-17.
Book volume table of contents
View Article: PDF

[17] Classical cryptology: Methods. Mathematical World 29 (2013) 19-50.
Book volume table of contents
View Article: PDF

[18] Margaret Cozzens and Steven J. Miller. The Mathematics of Encryption. Mathematical World 29 (2013) MR MR3098499.
Book volume table of contents

[19] Classical cryptography: Attacks II. Mathematical World 29 (2013) 113-131.
Book volume table of contents
View Article: PDF

[20] Error detecting and correcting codes. Mathematical World 29 (2013) 239-268.
Book volume table of contents
View Article: PDF

[21] Classical cryptography: Attacks I. Mathematical World 29 (2013) 81-112.
Book volume table of contents
View Article: PDF

[22] Modern symmetric encryption. Mathematical World 29 (2013) 133-169.
Book volume table of contents
View Article: PDF

[23] Public-channel cryptography. Mathematical World 29 (2013) 213-237.
Book volume table of contents
View Article: PDF

[24] Koray Karabina. Squaring in cyclotomic subgroups. Math. Comp. 82 (2013) 555-579.
Abstract, references, and article information   
View Article: PDF

[25] Chi Sing Chum and Xiaowen Zhang. Improving Latin Square Based Secret Sharing Schemes. Contemporary Mathematics 582 (2012) 51-64.
Book volume table of contents   
View Article: PDF

[26] Stanislaw Jarecki and Nitesh Saxena. Authenticated Key Agreement with Key Re-Use in the Short Authenticated Strings Model. Contemporary Mathematics 582 (2012) 151-173.
Book volume table of contents   
View Article: PDF

[27] Chi Sing Chum, Benjamin Fine, Gerhard Rosenberger and Xiaowen Zhang. A Proposed Alternative to the Shamir Secret Sharing Scheme. Contemporary Mathematics 582 (2012) 47-50.
Book volume table of contents   
View Article: PDF

[28] Maggie Habeeb, Delaram Kahrobaei and Vladimir Shpilrain. A Secret Sharing Scheme Based on Group Presentations and the Word Problem. Contemporary Mathematics 582 (2012) 143-150.
Book volume table of contents   
View Article: PDF

[29] Rashid Ali and Martin Kreuzer. Weyl Gr\"{o}bner Basis Cryptosystems. Contemporary Mathematics 582 (2012) 1-20.
Book volume table of contents   
View Article: PDF

[30] Gohar M. Kyureghyan, Ferruh Özbudak and Alexander Pott. Some planar maps and related function fields. Contemporary Mathematics 574 (2012) 87-114.
Book volume table of contents   
View Article: PDF


Results: 1 to 30 of 133 found      Go to page: 1 2 3 4 > >>


Comments: Email Webmaster

© Copyright , American Mathematical Society
Contact Us · Sitemap · Privacy Statement

Connect with us Facebook Twitter Google+ LinkedIn Instagram RSS feeds Blogs YouTube Podcasts Wikipedia