Results 51 to 60 of about 269 (65)
Some of the next articles are maybe not open access.

Identity-Based Encryption from the Weil Pairing

SIAM Journal on Computing, 2003
Dan Boneh
exaly  

A Survey of Public-Key Cryptosystems

SIAM Review, 2004
Neal Koblitz
exaly  

Algorithms for elliptic curves

Journal of Discrete Mathematical Sciences and Cryptography, 2022
exaly  

Authenticated asymmetric group key agreement based on certificateless cryptosystem

International Journal of Computer Mathematics, 2014
Xixiang Lv, Hui Li
exaly  

Compact SD: a new encoding algorithm and its application in multiplication

International Journal of Computer Mathematics, 2017
Abdalhossein Rezai, Parviz Keshavarzi
exaly  

Private Information Retrieval from Coded Databases with Colluding Servers

SIAM Journal on Applied Algebra and Geometry, 2017
Ragnar Freij-Hollanti   +2 more
exaly  

A Public Key Cryptosystem Using Hiil's Cipher

Journal of Discrete Mathematical Sciences and Cryptography, 2015
Ranjithkumar M, Ranjithkumar M
exaly  

Toric Surface Codes and Minkowski Length of Polygons

SIAM Journal on Discrete Mathematics, 2009
Ivan Soprunov, Jenya Soprunova
exaly  

New secondary constructions of differentially 4-uniform permutations over

International Journal of Computer Mathematics, 2017
Jie Peng, Qichun Wang
exaly  

On the Rabin Signature

Journal of Discrete Mathematical Sciences and Cryptography, 2013
Michele Elia, Davide Schipani
exaly  

Home - About - Disclaimer - Privacy