Results 81 to 89 of about 172 (89)
Some of the next articles are maybe not open access.
How to Construct Pseudorandom Permutations from Pseudorandom Functions
SIAM Journal on Computing, 1988Michael Luby
exaly
Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$
SIAM Journal on Computing, 2014Vinod Vaikuntanathan
exaly
A new symmetrical cryptosystem based cellular automata and chaotic map function
Journal of Discrete Mathematical Sciences and Cryptography, 2022exaly
A Public Key Cryptosystem Using Hiil's Cipher
Journal of Discrete Mathematical Sciences and Cryptography, 2015Ranjithkumar M, Ranjithkumar M
exaly
On Frobenius groups of order q(q – 1)
Journal of Information and Optimization Sciences, 2017Akhilesh Chandra Yadav
exaly
New secondary constructions of differentially 4-uniform permutations over
International Journal of Computer Mathematics, 2017Jie Peng, Qichun Wang
exaly
Image encryption by using a specific adaptation of Lehmer’s algorithm
Journal of Discrete Mathematical Sciences and Cryptography, 2020exaly
A public key cryptosystem using Affine Hill Cipher under modulation of prime number
Journal of Information and Optimization Sciences, 2019exaly

