X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
94a60 (760) 760
mathematics, applied (499) 499
coding and information theory (442) 442
information and communication, circuits (436) 436
computer science, theory & methods (426) 426
mathematics (401) 401
data structures, cryptology and information theory (387) 387
discrete mathematics in computer science (327) 327
data encryption (325) 325
combinatorics (295) 295
cryptography (295) 295
computer science (277) 277
algorithms (143) 143
11t71 (142) 142
mathematics of computing (124) 124
analysis (121) 121
communications engineering, networks (120) 120
encryption (115) 115
68p25 (108) 108
mathematical analysis (91) 91
security (85) 85
06e30 (79) 79
14g50 (79) 79
verschlüsselung (65) 65
boolean functions (63) 63
94a55 (62) 62
cryptanalysis (62) 62
mathematical models (58) 58
94a62 (51) 51
data structures and information theory (51) 51
construction (46) 46
nonlinearity (46) 46
theory of computation (46) 46
polynomials (45) 45
codes (44) 44
algebra (41) 41
artificial intelligence (39) 39
mathematics, general (39) 39
cryptology (38) 38
linear complexity (37) 37
boolean function (36) 36
computer science, interdisciplinary applications (36) 36
symbolic and algebraic manipulation (34) 34
94c10 (33) 33
complexity (33) 33
computer hardware (33) 33
cryptography and security (33) 33
stream cipher (33) 33
stream ciphers (33) 33
public key infrastructure (30) 30
block cipher (29) 29
kryptographie (29) 29
11b50 (28) 28
attacks (28) 28
permutation (28) 28
signatures (27) 27
applied mathematics (26) 26
boolean algebra (26) 26
algebraic immunity (25) 25
permutations (25) 25
research (25) 25
computation (24) 24
identity-based encryption (22) 22
mathematical research (22) 22
öffentlicher schlüssel (22) 22
boole-funktion (21) 21
computer information security (21) 21
protocol (21) 21
authentication (20) 20
computational mathematics and numerical analysis (20) 20
finite fields (20) 20
sequences (20) 20
computer systems (19) 19
methods (19) 19
secure (19) 19
usage (19) 19
computer simulation (18) 18
block ciphers (17) 17
computer science - cryptography and security (17) 17
lower bounds (17) 17
public key cryptography (17) 17
safety and security measures (17) 17
applications of mathematics (16) 16
elliptic curves (16) 16
functions (16) 16
provable security (16) 16
secret sharing (16) 16
11t06 (15) 15
11y16 (15) 15
algebraic degree (15) 15
computer communication networks (15) 15
cryptosystems (15) 15
digital signatures (15) 15
finite-fields (15) 15
aes (14) 14
algorithm (14) 14
computer security (14) 14
discrete logarithm (14) 14
discrete logarithm problem (14) 14
equivalence (14) 14
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


The American Mathematical Monthly, ISSN 0002-9890, 01/2019, Volume 126, Issue 1, pp. 77 - 77
Journal Article
Communications in Algebra, ISSN 0092-7872, 10/2019, Volume 47, Issue 10, pp. 4224 - 4229
We use extensions of tropical algebras as platforms for very efficient public key exchange protocols. 
tropical algebra | Public key exchange | 94A60 | 15A80 | MATHEMATICS | Cryptography | Homomorphisms
Journal Article
Experimental Mathematics, ISSN 1058-6458, 10/2019, Volume 28, Issue 4, pp. 385 - 397
We call a simple abelian variety over super-isolated if its ( -rational) isogeny class contains no other varieties. The motivation for considering these... 
abelian varieties | 94A60 | 11T71 | number theory | elliptic curve cryptography | 11G10
Journal Article
Tatra Mountains Mathematical Publications, ISSN 1210-3195, 09/2016, Volume 67, Issue 1, pp. 167 - 190
Ensuring confidentiality and integrity of communication remains among the most important goals of cryptography. The notion of authenticated encryption marries... 
CAESAR competition | authenticated encryption | 94A60 | Authenticated encryption
Journal Article
Groups Complexity Cryptology, ISSN 1867-1144, 11/2016, Volume 8, Issue 2, pp. 171 - 186
Polycyclic groups are natural generalizations of cyclic groups but with more complicated algorithmic properties. They are finitely presented and the word,... 
20F10 | complexity | cryptography | Polycyclic groups | 94A60
Journal Article
Designs, Codes and Cryptography, ISSN 0925-1022, 4/2014, Volume 71, Issue 1, pp. 57 - 81
Journal Article
Journal of Mathematical Cryptology, ISSN 1862-2976, 10/2015, Volume 9, Issue 3, pp. 169 - 203
The learning with errors (LWE) problem has become a central building block of modern cryptographic constructions. This work collects and presents hardness... 
Learning with Errors | lattice reduction | 94A60 | 11T71 | lattice-based cryptography | Algorithms | Research | Cryptography | Mathematical research | Error analysis (Mathematics) | Machine learning | Errors | Applied mathematics | Learning | Concretes | Reduction | Lattices | Hardness | Estimates
Journal Article
Journal of Discrete Mathematical Sciences and Cryptography, ISSN 0972-0529, 07/2017, Volume 20, Issue 5, pp. 1207 - 1215
In this article, we describe a key exchange protocol based on right transversals. We also describe it for general extension associated to right loops. 
Right transversals and Right loops | 20N05 | 94A60
Journal Article
Journal of Discrete Mathematical Sciences and Cryptography, ISSN 0972-0529, 05/2019, Volume 22, Issue 4, pp. 491 - 498
Facts say that practical cryptographic systems are now within the range. Quantum cryptography generally gives the solution which uses the various methods of... 
Message Verification | Security Attack | 94A60 | Quantum Cryptography | Authentication
Journal Article
Journal of Discrete Mathematical Sciences and Cryptography, ISSN 0972-0529, 05/2019, Volume 22, Issue 4, pp. 499 - 507
Quantum Cryptography is revolutionary discovery in the field of network security. Quantum cryptography promises to provide sophisticated functionality for... 
Message Verification | Security Attack | 94A60 | Quantum Cryptography | Authentication
Journal Article
Designs, Codes, and Cryptography, ISSN 0925-1022, 01/2019, Volume 87, Issue 1, pp. 149 - 162
Trivium is a well-known lightweight synchronous stream cipher that was submitted to the European eSTREAM project in April 2005. Thus far, it has been difficult... 
State cycles | Trivium-model | Trivium | Security | MATHEMATICS, APPLIED | COMPUTER SCIENCE, THEORY & METHODS | 94A60
Journal Article
Journal of Discrete Mathematical Sciences and Cryptography, ISSN 0972-0529, 04/2019, Volume 22, Issue 3, pp. 361 - 370
In this paper we consider the problem of variability of eSTREAM cipher HC-128. By variability of a cipher, we mean the maximum number of distinct key sequences... 
MSC 94A60 | Variability | HC-128 | eSTREAM | Cryptanalysis | Key sequence | MSC 94
Journal Article
Journal of Information and Optimization Sciences: Techniques of Engineering Optimization & Security, ISSN 0252-2667, 07/2019, Volume 40, Issue 5, pp. 1081 - 1095
Purpose: This study reviews the research work that has been carried out in the field of cryptocurrency (cc) and financial risk during past five years (... 
Virtual currency | Digital money | 94A60 | Cryptocurrency | Cryptocurrency legislation | Crypto assets
Journal Article
Journal of Mathematical Cryptology, ISSN 1862-2976, 12/2017, Volume 11, Issue 4, pp. 195 - 203
Breaking RSA is one of the fundamental problems in cryptography. Due to its reliance on the difficulty of the integer factorization problem, no efficient... 
RSA | cryptosystem | 94A60 | public key | Integers | Cryptography | Breaking
Journal Article
Designs, Codes and Cryptography, ISSN 0925-1022, 3/2014, Volume 70, Issue 3, pp. 369 - 383
Journal Article
Tatra Mountains Mathematical Publications, ISSN 1210-3195, 09/2017, Volume 70, Issue 1, pp. 93 - 105
The known method of high nonlinear S-boxes generation based on the gradient descent [Kazymyrov, O. V.: Methods and Techniques of Generation of Nonlinear... 
algebraic immunity | 68P25 | 94A60 | S-box | nonlinearity | vectorial Boolean function
Journal Article
Journal of Mathematical Cryptology, ISSN 1862-2976, 10/2019, Volume 13, Issue 3, pp. 197 - 228
Recently, Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure predicate encryption (PE) based on a new primitive, called .... 
11T71 | 14G50 | Pair encodings | 94A62 | predicate signatures | 94A60 | adaptive unforgeability | perfect privacy | Signatures | Encryption
Journal Article
Annali di Matematica Pura ed Applicata (1923 -), ISSN 0373-3114, 12/2019, Volume 198, Issue 6, pp. 2043 - 2057
In this paper, we study the relationships between the elementary abelian regular subgroups and the Sylow 2-subgroups of their normalisers in the symmetric... 
20B35 | 20D20 | Elementary abelian regular subgroups | Cryptanalysis | Mathematics, general | Mathematics | Affine groups | 94A60 | Sylow 2-subgroups | Block ciphers
Journal Article
Rocky Mountain Journal of Mathematics, ISSN 0035-7596, 2015, Volume 45, Issue 4, pp. 1283 - 1309
In this work, we present a modification of a well-established measure of dependence appropriate for the analysis of stopping times for adversarial processes on... 
MATHEMATICS | INDIFFERENTIABILITY | LIMIT-THEOREM | 94A60
Journal Article
Tatra Mountains Mathematical Publications, ISSN 1210-3195, 09/2017, Volume 70, Issue 1, pp. 119 - 138
The generalized key substitution attacks were proposed as a generalization of the key substitution attacks to examine the security of the signature schemes... 
generalized key substitution attacks | discrete logarithm | 94A60 | message recovery signature
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.