Entity usage
From MaRDI portal
This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.
Showing below up to 50 results in range #1 to #50.
- Use of the ‘Signature Token’ to Create a Negotiable Document: Miscellaneous (e.g. aliases, entity existence)
- RSA bits are .732 + ε secure: Miscellaneous (e.g. aliases, entity existence)
- Improving the Security of Exponential Key Exchange: Miscellaneous (e.g. aliases, entity existence)
- Some Results on the Information Theoretic Analysis of Cryptosystems: Miscellaneous (e.g. aliases, entity existence)
- Permutation Polynomials in RSA-Cryptosystems: Miscellaneous (e.g. aliases, entity existence)
- A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p 2): Miscellaneous (e.g. aliases, entity existence)
- Probabilistic Analysis and Performance Modelling of the ‘Swedish’ Algorithm and Modifications: Miscellaneous (e.g. aliases, entity existence)
- Field Encryption and Authentication: Miscellaneous (e.g. aliases, entity existence)
- On the Security of Compressed Encodings: Miscellaneous (e.g. aliases, entity existence)
- Producing a One-Way Hash Function from DES: Miscellaneous (e.g. aliases, entity existence)
- Analytical Characteristics of the DES: Miscellaneous (e.g. aliases, entity existence)
- A Layered Broadcast Cryptographic System: Miscellaneous (e.g. aliases, entity existence)
- Blind Signature System: Miscellaneous (e.g. aliases, entity existence)
- How to Exchange Half a Bit: Miscellaneous (e.g. aliases, entity existence)
- Reducibility Among Protocols: Miscellaneous (e.g. aliases, entity existence)
- A Simple Protocol for Signing Contracts: Miscellaneous (e.g. aliases, entity existence)
- Signatures Through Approximate Representations by Quadratic Forms: Miscellaneous (e.g. aliases, entity existence)
- Factorization Using the Quadratic Sieve Algorithm: Miscellaneous (e.g. aliases, entity existence)
- Factoring Numbers on the Massively Parallel Computer: Miscellaneous (e.g. aliases, entity existence)
- New Ideas for Factoring Large Integers: Miscellaneous (e.g. aliases, entity existence)
- An Overview of Factoring: Miscellaneous (e.g. aliases, entity existence)
- The Prisoners’ Problem and the Subliminal Channel: Miscellaneous (e.g. aliases, entity existence)
- On the Power of Cascade Ciphers: Miscellaneous (e.g. aliases, entity existence)
- Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems: Miscellaneous (e.g. aliases, entity existence)
- Solving Low Density Knapsacks: Miscellaneous (e.g. aliases, entity existence)
- Knapsack Public Key Cryptosystems and Diophantine Approximation: Miscellaneous (e.g. aliases, entity existence)
- RSA Chips (Past/Present/Future) (Extended abstract): Miscellaneous (e.g. aliases, entity existence)
- A New Trapdoor Knapsack Public Key Cryptosystem: Miscellaneous (e.g. aliases, entity existence)
- Non Linear Non Commutative Functions for Data Integrity: Miscellaneous (e.g. aliases, entity existence)
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information: Miscellaneous (e.g. aliases, entity existence)
- Some Public-Key Crypto-Functions as Intractable as Factorization: Miscellaneous (e.g. aliases, entity existence)
- On Cryptosystems Based on Polynomials and Finite Fields: Miscellaneous (e.g. aliases, entity existence)
- Strong Primes are Easy to Find: Miscellaneous (e.g. aliases, entity existence)
- Algebraical Structures of Cryptographic Transformations: Miscellaneous (e.g. aliases, entity existence)
- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System: Miscellaneous (e.g. aliases, entity existence)
- Propagation Characteristics of the DES: Miscellaneous (e.g. aliases, entity existence)
- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme: Miscellaneous (e.g. aliases, entity existence)
- RSA-bits are 0.5 + ε secure: Miscellaneous (e.g. aliases, entity existence)
- Linear Ciphers and Random Sequence Generators with Multiple Clocks: Miscellaneous (e.g. aliases, entity existence)
- On the Use of the Binary Multiplying Channel in a Private Communication System: Miscellaneous (e.g. aliases, entity existence)
- Equivocations for Homophonic Ciphers: Miscellaneous (e.g. aliases, entity existence)
- Wire-Tap Channel II: Miscellaneous (e.g. aliases, entity existence)
- Authentication Theory/Coding Theory: Miscellaneous (e.g. aliases, entity existence)
- A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft): Miscellaneous (e.g. aliases, entity existence)
- Security of a Keystream Cipher with Secret Initial Value: Miscellaneous (e.g. aliases, entity existence)
- Fast Computation of Discrete Logarithms in GF (q): Miscellaneous (e.g. aliases, entity existence)
- On the Security of Ping-Pong Protocols: Miscellaneous (e.g. aliases, entity existence)
- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem: Miscellaneous (e.g. aliases, entity existence)
- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem: Miscellaneous (e.g. aliases, entity existence)
- How to Keep a Secret Alive: Miscellaneous (e.g. aliases, entity existence)